Building a Fortress: A Comprehensive Guide to Secure Application Development
Tej Gandhi
/ December 2, 2023
This blog aims to provide a high level understanding of key aspects of secure application development, from understanding security threats...
Read More
Building robust code (Cyber Security):
Tej Gandhi
/ November 25, 2023
Introduction: Under the hood, software's work on code. Software have security glitches, weakness! Consider an example of Log4j vulnerability, a...
Read More
CISSP Module 1 Summary: Security and Risk Management
Tej Gandhi
/ October 22, 2023
Fundamental principals of Security (Security Objectives)-CIA TriadThe CIA triad is a cornerstone of information security, guiding the implementation of measures...
Read More
Simple Reverse Engineering Virtual Machine
Tej Gandhi
/ June 2, 2023
You can download the Virtual Machine from below: Welcome to the Simple Malware Analysis VM! We have created this VM...
Read More
Few useful Python library used in Cyber Security
admin
/ May 27, 2023
Author: rishi@globaldigitalsecurity.ca Scapy: Scapy can be used to capture and manipulate network packets. Here's an example of how to use...
Read More
The Top Five Job Roles for Certified Cybersecurity Technicians
admin
/ April 8, 2023
Cyberattacks increased by 50% globally between 2020 and 2021 alone (Check Point, 2022). As a result, demand is rising throughout...
Read More
How to get started in Cyber Security?
admin
/ April 8, 2023
Train and Get Globally Recognized Certifications! Preliminary start in this industry can be through started training in Information Security and...
Read More
CVE 2022-30190 Zero Click Zero Day in msdt
admin
/ April 8, 2023
Msdt.exe is an executable exe file that belongs to the Diagnostics Troubleshooting Wizard process which comes along with the Microsoft...
Read More
ChatGPT AI utilized to create malware
Author: shashank@globaldigitalsecurity.ca/zaverishashank0@gmail.com According to sources there are some questions raised about an artificial intelligence bot which is easily accessible on...
Read More
Zero-Day Vulnerability
Author:suhani@globaldgitialsecurity.ca A security issue that has not yet been disclosed to the vendor or developers is referred to as a...
Read More
{"dots":"true","arrows":"true","autoplay":"true","autoplay_interval":3000,"speed":600,"loop":"true","design":"design-1"}