top of page
Nexix Security Labs
May 23, 20224 min read
The importance of Strong, Secure Passwords
Users must be aware of certain password security aspects in order to limit the chances of a hacker cracking their password and gaining acces
290
Nexix Security Labs
Apr 22, 20222 min read
Three phases of Application Security
Application security is described as the development, addition, and testing of security features within applications to avoid security
660
Nexix Security Labs
Apr 12, 20223 min read
Verblecon Malware Loader Used in Stealthy Cryptomining Attacks
Security researchers are warning of a new malware loader known as Verblecon, which is complicated and powerful enough for ransomware...
280
Nexix Security Labs
Jan 17, 20228 min read
Blockchain for Cybersecurity
A blockchain is a decentralized ledger that records all transactions that take place across a peer-to-peer network.
410
Nexix Security Labs
Nov 25, 20213 min read
FBI's Email System Hacked!
The fake emails were sent using the Law Enforcement Enterprise Portal system, which is used to connect with state and local officials, rathe
320
Nexix Security Labs
Oct 16, 20213 min read
Netgear: Authentication Bypass Vulnerability
The Netgear authentication bypass vulnerability was the susceptibility identified on the Netgear devices before version 1.0.0.32 that has in
370
Nexix Security Labs
Oct 4, 20213 min read
SolarWinds Hack: Everything you need to know
SolarWinds is the subject of a massive cybersecurity attack that spread to the company’s clients. Not a single company but series
270
Nexix Security Labs
Sep 22, 20213 min read
What is Dark Web? Is it dangerous? How to access it?
The Dark Web’s infrastructure was created in the 1970s likely to that of the internet.
2050
Nexix Security Labs
Jul 31, 20212 min read
How Google Tracks You
Privacy has become a big phenomena in a society where everyone is overexposed. The majority of us value our privacy and don't want people...
1790
Nexix Security Labs
Jul 5, 20213 min read
OSINT: What is open source intelligence and how is it used?
Any particulars or facts that can be discovered publicly, mainly through the internet devoid of any copyright or privacy laws is acronymized
1090
bottom of page