top of page

Nexix Security Labs
Oct 4, 20213 min read
SolarWinds Hack: Everything you need to know
SolarWinds is the subject of a massive cybersecurity attack that spread to the company’s clients. Not a single company but series
270

Nexix Security Labs
Sep 22, 20213 min read
What is Dark Web? Is it dangerous? How to access it?
The Dark Web’s infrastructure was created in the 1970s likely to that of the internet.
2060

Nexix Security Labs
Sep 7, 20212 min read
Pegasus Spyware: What is it? How does it infect your Device?
Created by NSO Group, an Israeli tech firm, Pegasus Spyware was created to help governments, investigation agencies to target bad elements
1130

Nexix Security Labs
Jul 31, 20212 min read
How Google Tracks You
Privacy has become a big phenomena in a society where everyone is overexposed. The majority of us value our privacy and don't want people...
1790

Nexix Security Labs
Jul 22, 20213 min read
Web Application Attacks
Significant weaknesses or vulnerabilities let the crooks receive direct and public access to databases to bucket up sensitive data...
800

Nexix Security Labs
Jul 14, 20213 min read
What Is a Phishing Attack? How it works and Types
The tactic of garnering sensitive information of a target like a username, password, email-ID, mobile number, etc., or other sensitive infor
1170

Nexix Security Labs
Jul 5, 20213 min read
OSINT: What is open source intelligence and how is it used?
Any particulars or facts that can be discovered publicly, mainly through the internet devoid of any copyright or privacy laws is acronymized
1120

Nexix Security Labs
Jun 22, 20213 min read
Cryptography Definition
Derived from “Kryptos”, meaning hidden fundamentally, Cryptography is the procedure of securing information
1270

Nexix Security Labs
Jun 17, 20213 min read
Understanding Of Web Protocols - HTTP and HTTPS
HTTPS stands for Hypertext Transfer Protocol Secure. The main difference between the two protocols is that HTTPS encrypts regular HTTP.
980

Nexix Security Labs
May 8, 20212 min read
What are Cybersecurity audits and why are they important?
Cybersecurity has been the talk of the town ever since the first computer virus was created. We keep on hearing about many security breaches
1630
bottom of page