top of page

Nexix Security Labs
Jul 14, 20213 min read
What Is a Phishing Attack? How it works and Types
The tactic of garnering sensitive information of a target like a username, password, email-ID, mobile number, etc., or other sensitive infor
1170

Nexix Security Labs
Jul 5, 20213 min read
OSINT: What is open source intelligence and how is it used?
Any particulars or facts that can be discovered publicly, mainly through the internet devoid of any copyright or privacy laws is acronymized
1120

Nexix Security Labs
Jun 22, 20213 min read
Cryptography Definition
Derived from “Kryptos”, meaning hidden fundamentally, Cryptography is the procedure of securing information
1270

Nexix Security Labs
Jun 17, 20213 min read
Understanding Of Web Protocols - HTTP and HTTPS
HTTPS stands for Hypertext Transfer Protocol Secure. The main difference between the two protocols is that HTTPS encrypts regular HTTP.
980

Nexix Security Labs
May 8, 20212 min read
What are Cybersecurity audits and why are they important?
Cybersecurity has been the talk of the town ever since the first computer virus was created. We keep on hearing about many security breaches
1630
bottom of page