top of page
Nexix Security Labs
Jul 31, 20224 min read
What is two-factor authentication and how does it work?
Users supply two distinct authentication factors as part of a security procedure known as two-factor authentication (2FA), also known as two
2150
Nexix Security Labs
May 12, 20224 min read
What is Zero Trust Security?
The main concept behind the zero trust security model is "never trust, always verify,” which means that devices should not be trusted.
230
Nexix Security Labs
Apr 22, 20222 min read
Three phases of Application Security
Application security is described as the development, addition, and testing of security features within applications to avoid security
660
Nexix Security Labs
Feb 10, 20226 min read
How To Safely Use Public Wi-Fi
If you want to be secure while using public Wi-Fi, you must first understand the hazards. We created a list to assist you to identify the 7
370
Nexix Security Labs
Jan 17, 20228 min read
Blockchain for Cybersecurity
A blockchain is a decentralized ledger that records all transactions that take place across a peer-to-peer network.
410
Nexix Security Labs
Nov 25, 20213 min read
FBI's Email System Hacked!
The fake emails were sent using the Law Enforcement Enterprise Portal system, which is used to connect with state and local officials, rathe
320
Nexix Security Labs
Nov 9, 20212 min read
What is Cryptojacking and How does it work?
Cryptojacking is a sort of cybercrime in which a criminal secretly generates cryptocurrency using the computing power of a victim.
370
Nexix Security Labs
Nov 1, 20213 min read
INSIDER THREATS
Insider threats in cyber security are threats possessed by individuals from within an organization, such as current or former employees
650
Nexix Security Labs
Oct 16, 20213 min read
Netgear: Authentication Bypass Vulnerability
The Netgear authentication bypass vulnerability was the susceptibility identified on the Netgear devices before version 1.0.0.32 that has in
370
Nexix Security Labs
Sep 22, 20213 min read
What is Dark Web? Is it dangerous? How to access it?
The Dark Web’s infrastructure was created in the 1970s likely to that of the internet.
2050
Nexix Security Labs
Jul 31, 20212 min read
How Google Tracks You
Privacy has become a big phenomena in a society where everyone is overexposed. The majority of us value our privacy and don't want people...
1790
Nexix Security Labs
Jul 22, 20213 min read
Web Application Attacks
Significant weaknesses or vulnerabilities let the crooks receive direct and public access to databases to bucket up sensitive data...
800
Nexix Security Labs
Jul 14, 20213 min read
What Is a Phishing Attack? How it works and Types
The tactic of garnering sensitive information of a target like a username, password, email-ID, mobile number, etc., or other sensitive infor
1060
Nexix Security Labs
Jul 5, 20213 min read
OSINT: What is open source intelligence and how is it used?
Any particulars or facts that can be discovered publicly, mainly through the internet devoid of any copyright or privacy laws is acronymized
1090
Nexix Security Labs
Jun 22, 20213 min read
Cryptography Definition
Derived from “Kryptos”, meaning hidden fundamentally, Cryptography is the procedure of securing information
1260
Nexix Security Labs
Jun 17, 20213 min read
Understanding Of Web Protocols - HTTP and HTTPS
HTTPS stands for Hypertext Transfer Protocol Secure. The main difference between the two protocols is that HTTPS encrypts regular HTTP.
980
Nexix Security Labs
May 8, 20212 min read
What are Cybersecurity audits and why are they important?
Cybersecurity has been the talk of the town ever since the first computer virus was created. We keep on hearing about many security breaches
1610
bottom of page