NINJA BLOG

Meltdown and Spectre attacks

A new class of side-channel attacks have been appeared, which exploit the following CPU vulnerabilities: CVE-2017-5715 : branch target injection CVE-2017-5753 : bounds check...

Castle Vs Airport Model in security

Apart from changing the way we live, this virtual connectivity has exposed us to an array of attacks. Cyber risks are a growing concern...

IP spoofing: don’t let hackers deceive…

IP address spoofing is a technique used by hackers to disguise their IP address as another IP and gain access to sensitive information or...

What should you know about honeypots…

Honeypots are a form of proactive threat detections. Proactive threat detection is the next step in improving an...

Heckin Funny Hacks

Hacking became a huge part of our lives, partly because of popular culture and partly because they can give us some serious headaches when...

BUILD YOUR SECURITY

Start the 7-day free trial with full functionality without spending a cent.

TOP ARTICLES