top of page

Nexix Security Labs
Jul 22, 20213 min read
Web Application Attacks
Significant weaknesses or vulnerabilities let the crooks receive direct and public access to databases to bucket up sensitive data...
800

Nexix Security Labs
Jul 14, 20213 min read
What Is a Phishing Attack? How it works and Types
The tactic of garnering sensitive information of a target like a username, password, email-ID, mobile number, etc., or other sensitive infor
1170
bottom of page