Not all libraries are present in the environment provided by AWS lambda (Obviously!
read moreNot all libraries are present in the environment provided by AWS lambda (Obviously!
read moreHow does a SQL Injection attack work? SQL injection attack is possible when a website exposes inputs to be taken from the user and uses the user input to directly run a query in MySQL.
read moreEmail Spoofing Email Spoofing is a type of cyber-attack where the attacker sends fake emails which appear to have been sent by a legitimate/known person or entity.
read moreGoogle Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet.
read moreWhat is a Backdoor ? Backdoor is a method of secretly gaining remote access to a computer by bypassing the normal authentication and firewall of the machine.
read moreA Trojan horse (or Trojan) is one of the most common and dangerous types of threats that can infect your computer or mobile device.
read more