Arslan ud Din Shafiq

What is OPSEC?

OPSEC, short for Operations Security, is a systematic process used to protect sensitive information from being disclosed to unauthorized individuals,… Read More

2 years ago

What is whaling in cyber security?

Whaling is a type of cyber attack that targets high-level executives, such as CEOs, CFOs, and Presidents. The term "whaling"… Read More

2 years ago

Tailgating in Cyber Security (Piggybacking)

Tailgating, also known as "piggybacking," is a security vulnerability in which an unauthorized person gains access to a restricted area… Read More

2 years ago

What is fuzzing?

Fuzzing, also known as fuzz testing, is a software testing technique that involves feeding random or semi-random data to a… Read More

2 years ago

What is a crypto mine?

A crypto mine, also known as a cryptocurrency mine or simply a mine, is a facility that is used to… Read More

2 years ago

What is smishing and phishing?

Smishing and phishing are forms of social engineering attacks that are used to trick individuals into giving up sensitive information,… Read More

2 years ago

What is CVE in cyber security?

CVE (Common Vulnerabilities and Exposures) is a system for identifying and cataloging cybersecurity vulnerabilities and exposures. It provides a common… Read More

2 years ago

What is MFA in Cyber Security? Multi Factor Authentication

MFA (Multi-Factor Authentication) is a security measure used in cybersecurity to provide an additional layer of protection beyond traditional username… Read More

2 years ago

What is SOAR in Cyber Security?

SOAR (Security Orchestration, Automation, and Response) is a cybersecurity approach that aims to streamline and automate the various processes involved… Read More

2 years ago