Suraj DhamakNavigating the Cybersecurity Battlefield: Unraveling the Roles of Red, Blue, and Purple TeamsIn the ever-shifting realm of cybersecurity, where every digital frontier is a potential battleground, defenders deploy specialized teams…3 min read·Jan 22, 2024----
Suraj DhamakSDLC with a Real-Life ExampleSDLC stands for Software Development Life Cycle. It is a process that outlines the various stages that software goes through from…2 min read·Apr 16, 2023----
Suraj DhamakPorter’s Five Forces ModelPorter’s Competitive Model, also known as Porter’s Five Forces, is a framework developed by Michael Porter in 1979 to analyze the…3 min read·Apr 14, 2023----
Suraj DhamakTryHackMe : Welcome walkthroughHello folks Hope everyone’s doing well. TryHackMe is an amazing platform where you can practice and polish your skills in cybersecurity…2 min read·Dec 7, 2022----
Suraj DhamakWatering Hole AttackDo you know alligators? Alligators rarely move towards the prey’s area. They just keep hiding in the water and wait for their prey to…3 min read·Dec 1, 2022----
Suraj DhamakCryptography: The Magic of SecurityImagine a scenario where you are shopping on an e-commerce web application. At the check -out stage you made a payment of some $xxxx and…3 min read·Nov 29, 2022----
Suraj DhamakAll about DNS security flawsDomain Name System is nothing but a simple translator between humans and computers. It converts a domain name into its IP address so the…3 min read·Jul 7, 2022----
Suraj DhamakCryptographic Failure — OWASP Top 10Cryptographic Failure is listed second in the OWASP Top 10–2021. According to 2017 list this vulnerability was at third position and…4 min read·Feb 18, 2022----
Suraj DhamakBroken Access Control — OWASP Top 10Broken access control is listed first in the OWASP Top 10–2021. According to 2017 list this vulnerability was at fifth position. As per…4 min read·Jan 19, 2022----
Suraj DhamakOWASP Top 10 2021Let’s talk about OWASP Top-10 2021 and get a short overview4 min read·Sep 10, 2021----