top of page

What Is a Phishing Attack? How it works and Types
The tactic of garnering sensitive information of a target like a username, password, email-ID, mobile number, etc., or other sensitive infor
Nexix Security Labs
Jul 14, 20213 min read
120
0

OSINT: What is open source intelligence and how is it used?
Any particulars or facts that can be discovered publicly, mainly through the internet devoid of any copyright or privacy laws is acronymized
Nexix Security Labs
Jul 5, 20213 min read
113
0

Cryptography Definition
Derived from “Kryptos”, meaning hidden fundamentally, Cryptography is the procedure of securing information
Nexix Security Labs
Jun 22, 20213 min read
129
0

Understanding Of Web Protocols - HTTP and HTTPS
HTTPS stands for Hypertext Transfer Protocol Secure. The main difference between the two protocols is that HTTPS encrypts regular HTTP.
Nexix Security Labs
Jun 17, 20213 min read
98
0

What are Cybersecurity audits and why are they important?
Cybersecurity has been the talk of the town ever since the first computer virus was created. We keep on hearing about many security breaches
Nexix Security Labs
May 8, 20212 min read
165
0
bottom of page