Nexix Security LabsJul 14, 20213 min readWhat Is a Phishing Attack? How it works and TypesThe tactic of garnering sensitive information of a target like a username, password, email-ID, mobile number, etc., or other sensitive infor
Nexix Security LabsJul 5, 20213 min readOSINT: What is open source intelligence and how is it used?Any particulars or facts that can be discovered publicly, mainly through the internet devoid of any copyright or privacy laws is acronymized
Nexix Security LabsJun 22, 20213 min readCryptography DefinitionDerived from “Kryptos”, meaning hidden fundamentally, Cryptography is the procedure of securing information
Nexix Security LabsJun 17, 20213 min readUnderstanding Of Web Protocols - HTTP and HTTPSHTTPS stands for Hypertext Transfer Protocol Secure. The main difference between the two protocols is that HTTPS encrypts regular HTTP.
Nexix Security LabsMay 8, 20212 min readWhat are Cybersecurity audits and why are they important?Cybersecurity has been the talk of the town ever since the first computer virus was created. We keep on hearing about many security breaches