Suraj DhamakNavigating the Cybersecurity Battlefield: Unraveling the Roles of Red, Blue, and Purple TeamsIn the ever-shifting realm of cybersecurity, where every digital frontier is a potential battleground, defenders deploy specialized teams…Jan 22Jan 22
Suraj DhamakSDLC with a Real-Life ExampleSDLC stands for Software Development Life Cycle. It is a process that outlines the various stages that software goes through from…Apr 16, 2023Apr 16, 2023
Suraj DhamakPorter’s Five Forces ModelPorter’s Competitive Model, also known as Porter’s Five Forces, is a framework developed by Michael Porter in 1979 to analyze the…Apr 14, 2023Apr 14, 2023
Suraj DhamakTryHackMe : Welcome walkthroughHello folks Hope everyone’s doing well. TryHackMe is an amazing platform where you can practice and polish your skills in cybersecurity…Dec 7, 2022Dec 7, 2022
Suraj DhamakWatering Hole AttackDo you know alligators? Alligators rarely move towards the prey’s area. They just keep hiding in the water and wait for their prey to…Dec 1, 2022Dec 1, 2022
Suraj DhamakCryptography: The Magic of SecurityImagine a scenario where you are shopping on an e-commerce web application. At the check -out stage you made a payment of some $xxxx and…Nov 29, 2022Nov 29, 2022
Suraj DhamakAll about DNS security flawsDomain Name System is nothing but a simple translator between humans and computers. It converts a domain name into its IP address so the…Jul 7, 2022Jul 7, 2022
Suraj DhamakCryptographic Failure — OWASP Top 10Cryptographic Failure is listed second in the OWASP Top 10–2021. According to 2017 list this vulnerability was at third position and…Feb 18, 2022Feb 18, 2022
Suraj DhamakBroken Access Control — OWASP Top 10Broken access control is listed first in the OWASP Top 10–2021. According to 2017 list this vulnerability was at fifth position. As per…Jan 19, 2022Jan 19, 2022
Suraj DhamakOWASP Top 10 2021Let’s talk about OWASP Top-10 2021 and get a short overviewSep 10, 2021Sep 10, 2021