Cyber Security

Types of Salami Attacks

Salami attacks (also called salami slicing attacks) are cyber or fraud attacks where tiny, often unnoticed actions add up to a significant impact over time. Common types of Salami Attacks…

What is Salami attack?

In the world of cybercrime, not every attack is loud, destructive, or instantly visible. Some are quiet, precise, and designed to go unnoticed for months or even years. One of…

Nmap (Network Mapper)

Nmap (Network Mapper) is a powerful open-source tool used for network discovery and security auditing. It’s commonly used by network administrators and security professionals to identify hosts and services on…

What is Phishing Attack?

Phishing is a type of attacks where scammer attempts to obtain sensitive information by sending fraudulent communication that appear to come from a reputable source. The Phishing attacks can be…

What is Shellcode?

Shellcode is defined as a set of instructions injected and then executed by an exploit. It is used to directly manipulate the logs and functionality of an exploit, even ensuring…

What is port scanning?

Port Scanning is the technique used to identify open ports and service available on a host. The outsider use port scanning to find information that can be helpful to exploit…