Ivan NovikovThe Hand-y Etiquette of Modern All-Remote CultureIn today’s fast-paced digital world, remote work has become the new normal. With the rise of video conferencing platforms like Zoom and…May 14, 2023May 14, 2023
Ivan NovikovWhat is threat modeling ❓ Definition, Methods, ExampleThreat modeling is a method for upgrading the security of an application, system, or business process by distinguishing objections and…Feb 2, 2022Feb 2, 2022
Ivan NovikovWhat is Cross Site Request Forgery CSRF | Example and Methods of protectionOrganizations aspiring for all-around resource security against the damage-causing cyber vulnerabilities must upgrade their knowledge and…Jan 28, 2022Jan 28, 2022
Ivan NovikovServer side template injection — SSTI vulnerability ⚠️IntroductionJan 26, 2022Jan 26, 2022
Ivan NovikovWhat is XMPP ❓ — Extensible Messaging & Presence ProtocolIntroductionJan 25, 2022Jan 25, 2022
Ivan NovikovWhat is Cryptojacking Attack ❓ Definition and PreventionIntroductionJan 19, 2022Jan 19, 2022
Ivan NovikovWhat is API Abuse ❓ Prevention measures.APIs are paramount for constructing a steadfast and constant communication bridge that empowers devices to pass-on desired information…Jan 18, 2022Jan 18, 2022
Ivan NovikovWhat is RAT Remote Access Trojan ❓ Detection and RemovalIntroductionJan 14, 2022Jan 14, 2022
Ivan NovikovWhat is SAML authentication ❓ How does it work ❓Enterprises using various business apps have a tough time maintaining data’s secrecy and access grants as per user roles throughout the…Dec 30, 2021Dec 30, 2021