Skip to content
KyberSecMe

KyberSecMe

  • Home
  • About
  • Ethical Hacking
    • Footprinting and Reconnaissance Tools
    • Scanning Network Tools
    • Cyber Kill Chain
  • Contact

Month: February 2023

How to help secure your organization by using Google Dorks

February 28, 2023February 28, 2023
Petroslav Pavlovič
Footprinting and Reconnaissance Tools

What are Google dorks? Google dorks are search queries that employ sophisticated search operators to locate particular online data that may not be readily available through standard search searches. With the use of these search operators, users can look for

Read more

Quick overview of how to Trust Nobody!

February 28, 2023February 28, 2023
Petroslav Pavlovič
Uncategorized

68% of cybersecurity leaders say secure cloud transformation is impossible with legacy network security infrastructure such as firewalls and VPNs. Is predicted that Zero Trust will replace VPN by 2025. Over 70% of all organizations around the world have either

Read more

Artificial Intelligence, Security assistant, or Threat?

February 28, 2023March 1, 2023
Petroslav Pavlovič
Uncategorized

A July 2022 report by Acumen Research and Consulting says the global market was $14.9 billion in 2021 and is estimated to reach $133.8 billion by 2030. 68% of survey respondents stated that artificial intelligence (AI) can be used for

Read more

Archives

  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022

Categories

  • Cyber Kill Chain
  • Enumeration
  • Footprinting and Reconnaissance Tools
  • Scanning Network Tools
  • Uncategorized
KyberSecMe
© 2025
Powered by WordPress
Theme: Masonic by ThemeGrill
Cleantalk Pixel
Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}