Blogs

Blogs

Uncategorized

Building a Fortress: A Comprehensive Guide to Secure Application Development

This blog aims to provide a high level understanding of key aspects of secure application development, from understanding security threats...
Read More
Uncategorized

Building robust code (Cyber Security):

Introduction: Under the hood, software's work on code. Software have security glitches, weakness! Consider an example of Log4j vulnerability, a...
Read More
Uncategorized

CISSP Module 1 Summary: Security and Risk Management

Fundamental principals of Security (Security Objectives)-CIA TriadThe CIA triad is a cornerstone of information security, guiding the implementation of measures...
Read More
Uncategorized

Simple Reverse Engineering Virtual Machine

You can download the Virtual Machine from below: Welcome to the Simple Malware Analysis VM! We have created this VM...
Read More
Blog

Few useful Python library used in Cyber Security 

Author: rishi@globaldigitalsecurity.ca Scapy: Scapy can be used to capture and manipulate network packets. Here's an example of how to use...
Read More
Uncategorized

The Top Five Job Roles for Certified Cybersecurity Technicians

Cyberattacks increased by 50% globally between 2020 and 2021 alone (Check Point, 2022). As a result, demand is rising throughout...
Read More
Uncategorized

How to get started in Cyber Security?

Train and Get Globally Recognized Certifications! Preliminary start in this industry can be through started training in Information Security and...
Read More
Blog

CVE 2022-30190 Zero Click Zero Day in msdt

Msdt.exe is an executable exe file that belongs to the Diagnostics Troubleshooting Wizard process which comes along with the Microsoft...
Read More
Uncategorized

ChatGPT AI utilized to create malware

Author: shashank@globaldigitalsecurity.ca/zaverishashank0@gmail.com According to sources there are some questions raised about an artificial intelligence bot which is easily accessible on...
Read More
Blog

Zero-Day Vulnerability 

Author:suhani@globaldgitialsecurity.ca A security issue that has not yet been disclosed to the vendor or developers is referred to as a...
Read More
{"dots":"true","arrows":"true","autoplay":"true","autoplay_interval":3000,"speed":600,"loop":"true","design":"design-1"}
Social media & sharing icons powered by UltimatelySocial
YouTube
YouTube
LinkedIn
LinkedIn
Share