Skip to content
KyberSecMe

KyberSecMe

  • Home
  • About
  • Ethical Hacking
    • Footprinting and Reconnaissance Tools
    • Scanning Network Tools
    • Cyber Kill Chain
  • Contact

Category: Uncategorized

web shell attack

April 30, 2023July 22, 2023
Petroslav Pavlovič
Uncategorized

Between August 2020 and January 2021, there were 140,000 web shell attacks. (Microsoft) How hackers can performing web shell A web shell is a type of malicious code that can be uploaded to a web server, allowing an attacker to

Read more

How to avoid an attacker will spoof your email?

April 30, 2023July 22, 2023
Petroslav Pavlovič
Uncategorized

Over 3 billion domain spoofing emails delivered per day. Yahoo was the most impersonated brand for phishing attacks during Q4 2022, climbing 23 places and accounting for 20% of all attempts. (Checkpoint.com) SPF, or Sender Policy Framework, is an email

Read more

Quick overview of how to Trust Nobody!

February 28, 2023February 28, 2023
Petroslav Pavlovič
Uncategorized

68% of cybersecurity leaders say secure cloud transformation is impossible with legacy network security infrastructure such as firewalls and VPNs. Is predicted that Zero Trust will replace VPN by 2025. Over 70% of all organizations around the world have either

Read more

Artificial Intelligence, Security assistant, or Threat?

February 28, 2023March 1, 2023
Petroslav Pavlovič
Uncategorized

A July 2022 report by Acumen Research and Consulting says the global market was $14.9 billion in 2021 and is estimated to reach $133.8 billion by 2030. 68% of survey respondents stated that artificial intelligence (AI) can be used for

Read more

Have you troubled to remember all your passwords?

January 18, 2023February 28, 2023
Petroslav Pavlovič
Uncategorized

Password Manager Benefits And Choices. Web users without password managers are three times more likely to experience identity theft than those who properly use them. Google’s findings: 25% of Americans are still using weak passwords such as pass123, abcpass, or

Read more

Blockchain storage

January 18, 2023January 18, 2023
Petroslav Pavlovič
Uncategorized

For keeping data backup copies, decentralized, distributed storage systems can be madeusing blockchain technology. These systems don’t use a centralized server; instead, data isstored among a number of network nodes. Because there are several nodes where copies ofthe data are

Read more

Cloud Security

January 18, 2023January 19, 2023
Petroslav Pavlovič
Uncategorized

Due to the fact that they offer a practical means of achieving backup and storage, cloud storage solutions are extremely popular nowadays. Although most network or cloud storage systems currently support automatic backups, many users find backups to be uninteresting

Read more

Are you worried about your privacy?

January 11, 2023February 28, 2023
Petroslav Pavlovič
Uncategorized

Today, nearly a third of internet users use a Virtual private network (VPN). 82% of website traffic contains Google third-party script and half of them are tracking users. Since the beginning of the millennium, financial loss from data breaches of

Read more

Email Communications Security

January 10, 2023January 19, 2023
Petroslav Pavlovič
Uncategorized

Seven million unencrypted data records are compromised every day. Google says – 40-50% of emails sent between Gmail and other email providers still aren’t encrypted. The email encryption market is estimated to reach $11.80 billion in 2026 and $24.8 billion

Read more

Spam, Spam filters, and how to choose the correct one for you

January 5, 2023January 19, 2023
Petroslav Pavlovič
Uncategorized

One of the biggest spam email scams in history was the Nigerian letter scam, also known as the “419 scam,” named after the section of the Nigerian criminal code that deals with fraud. This scam involves the perpetrator sending a

Read more

Posts navigation

Older posts

Archives

  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022

Categories

  • Cyber Kill Chain
  • Enumeration
  • Footprinting and Reconnaissance Tools
  • Scanning Network Tools
  • Uncategorized
KyberSecMe
© 2025
Powered by WordPress
Theme: Masonic by ThemeGrill
Cleantalk Pixel
Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}