top of page


The Rise In Automotive Hacking
Automotive hacking is the practice of exploiting vulnerabilities in automotive software, hardware, and communication systems.

Nexix Security Labs
Dec 2, 20214 min read
419
0


FBI's Email System Hacked!
The fake emails were sent using the Law Enforcement Enterprise Portal system, which is used to connect with state and local officials, rathe

Nexix Security Labs
Nov 25, 20213 min read
37
0


What is a VPN? - Virtual Private Network
Virtual Private Network (VPN) refers to the ability to establish a secure network connection while using public networks.

Nexix Security Labs
Nov 15, 20214 min read
53
0


What is Cryptojacking and How does it work?
Cryptojacking is a sort of cybercrime in which a criminal secretly generates cryptocurrency using the computing power of a victim.

Nexix Security Labs
Nov 9, 20212 min read
37
0


INSIDER THREATS
Insider threats in cyber security are threats possessed by individuals from within an organization, such as current or former employees

Nexix Security Labs
Nov 1, 20213 min read
129
0


Cloud Computing Security Vulnerabilities and What to do about them
Companies are rapidly switching to the cloud to revolutionize their digital transformations. There are several benefits of cloud computing..

Nexix Security Labs
Oct 24, 20216 min read
19
0


Netgear: Authentication Bypass Vulnerability
The Netgear authentication bypass vulnerability was the susceptibility identified on the Netgear devices before version 1.0.0.32 that has in

Nexix Security Labs
Oct 16, 20213 min read
37
0


SolarWinds Hack: Everything you need to know
SolarWinds is the subject of a massive cybersecurity attack that spread to the company’s clients. Not a single company but series

Nexix Security Labs
Oct 4, 20213 min read
27
0


What is Dark Web? Is it dangerous? How to access it?
The Dark Web’s infrastructure was created in the 1970s likely to that of the internet.

Nexix Security Labs
Sep 22, 20213 min read
208
0


Pegasus Spyware: What is it? How does it infect your Device?
Created by NSO Group, an Israeli tech firm, Pegasus Spyware was created to help governments, investigation agencies to target bad elements

Nexix Security Labs
Sep 7, 20212 min read
113
0


Web Application Attacks
Significant weaknesses or vulnerabilities let the crooks receive direct and public access to databases to bucket up sensitive data...

Nexix Security Labs
Jul 22, 20213 min read
80
0


What Is a Phishing Attack? How it works and Types
The tactic of garnering sensitive information of a target like a username, password, email-ID, mobile number, etc., or other sensitive infor

Nexix Security Labs
Jul 14, 20213 min read
121
0


OSINT: What is open source intelligence and how is it used?
Any particulars or facts that can be discovered publicly, mainly through the internet devoid of any copyright or privacy laws is acronymized

Nexix Security Labs
Jul 5, 20213 min read
113
0


Cryptography Definition
Derived from “Kryptos”, meaning hidden fundamentally, Cryptography is the procedure of securing information

Nexix Security Labs
Jun 22, 20213 min read
129
0


Understanding Of Web Protocols - HTTP and HTTPS
HTTPS stands for Hypertext Transfer Protocol Secure. The main difference between the two protocols is that HTTPS encrypts regular HTTP.

Nexix Security Labs
Jun 17, 20213 min read
99
0


What are Cybersecurity audits and why are they important?
Cybersecurity has been the talk of the town ever since the first computer virus was created. We keep on hearing about many security breaches

Nexix Security Labs
May 8, 20212 min read
166
0
bottom of page