CyberSec - CyberSec Nerds
January 24, 2025

CyberSec

 

OAuth 2.0 — Security Considerations

Background Previously, the common way for granting authenticated access to web applications was through the use of a username and

 

Cookie’s SameSite Attribute vs CSRF — Demystified

Ambient Authority in the browser Whenever the browser sends off an HTTP request, it includes all the corresponding cookies for

  

FFUF — Everything You Need To Know

FFUF, short for “Fuzz Faster you Fool” is an open-source web fuzzing tool written in Go programming language, intended for

 

Lockheed Martin Cyber Kill Chain — Illustrated

The cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the

CURL — Everything You Need To Know

curl is a command-line utility for transferring data from or to a server designed to work without user interaction. With curl, you

NIST Methodology of Incident Response — Illustrated

In this article, we will act as a network defender and apply our expertise in intrusion detection and response skills

Cybersecurity Compliance

An Overview of Cybersecurity Compliance

A cyber attack! [delay- a half minute] Again another one! Did you know there is a malicious attack every other