Deception Technology 2.0: The Modern Art of Outsmarting Attackers Before They Strike
Cybercriminals are smarter, faster, and more persistent than ever before. Traditional defence tools detect threats after they...
SASE & SSE: The Future of Cloud Security – Converged, Unified & Zero Trust...
As organisations move aggressively toward cloud, hybrid work, and remote collaboration, the traditional perimeter-based security model has...
Digital Risk Protection Services (DRPS): The Ultimate 2025 Guide to Dark Web Monitoring &...
In 2025, cyber threats have evolved far beyond internal networks. Attackers target organisations from outside—through the dark...
What is MITM? How to Intercept HTTPS Traffic using MITM Proxy?
In this tutorial, I’ll illustrate HTTPS Traffic Interception using MITM Proxy i.e., Man In the Middle Proxy.
Normally, HTTPS encrypts all the HTTP Traffic meaning...
What is Phishing? How to identify Phishing websites?
In this tutorial, I’ll explain about Phishing & methods to identify a phishing website.Phishing is a cyber crime in which a target or targets are...
How to secure MySQL Server?
In this tutorial, I’ll illustrate MySQL Server Hardening.
Follow below steps in order to secure MySQL Server.iamvsm@SaraswatiRepository:~$ sudo mysql_secure_installation
NOTE: RUNNING ALL PARTS OF THIS SCRIPT...
How to Sniff Credential using Wireshark?
In this tutorial, I’ll demonstrate credential sniffing using Wireshark.
Before we dive in, I insist you to check out my previous post about Wireshark by...
What is Vulnerability & Vulnerability Assessment (VA)? How to use Nmap as Vulnerability Scanner?
In this tutorial, I’ll illustrate vulnerability scanning using Nmap. But before we dive in, Let’s understand about Vulnerability Assessments & it’s terminology.In cyber security,...
Web Application Firewall(WAF) Fingerprinting using Wafw00f
In this tutorial, I’m going to demonstrate Wafw00f Tool for fingerprint Web Application Firewall(WAF).Before moving ahead, I insist you to check out my previous...
What is Load Balancer(LB) & it’s types? How to detect Website using Load Balancing...
In this tutorial, I’ll explain you about Load Balancer(LB) & it’s types. Also I’ll demonstrate how to detect website using load balancing service.Load Balancer...











