dev-resources.site
for different kinds of informations.
infosec Article's
30 articles in total
Amass API - REST API Solution for Domain Reconnaissance
read article
How to Integrate and Configure Zabbix for Monitoring IT Infrastructure
read article
What Does an Incredible Web Application Firewall Look Like?
read article
Why a Web Hosting Provider Needs SafeLine WAF
read article
Mastering Information Gathering -A foundation
read article
TECNO SRC Security Vulnerability Submission Function Survey
read article
Some handy notes for GCP pentesting
read article
Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection
read article
What Does a Cyber Security Analyst Do?
read article
🌍 GeoIP Lookup Tool: Easily Get Geolocation Information of Any IP Address.
read article
How to Configure and Get Source IP in SafeLine WAF
read article
What is CDR?
read article
Phishing And Malware - A Practical Dive
read article
Cybersecurity Basics: A Beginner's Guide
read article
Easy CTF - Uma breve jornada de exploração com base no modelo OSI
read article
Sennovate is Now Among the Top 180 MSSPs in the World!
read article
Whats Information Security?
read article
# Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero
read article
What are ITDR in cyber security?
read article
Unified Kill Chain
read article
API Security: Threats, Tools, and Best Practices
read article
Supply Chain Risk Management Strategy with Sennovate
read article
Secure Data Stack: Navigating Adoption Challenges of Data Encryption
read article
How Does WAF Prevent OS Command Injection Attacks
read article
How Does WAF Prevent XSS Attacks
read article
Top 5 Website Data Leakage Events 2024
read article
Why You Need to Protect Your Website and How
read article
Data Security Strategy Beyond Access Control: Data Encryption
read article
American Water Spaniel: Breed Facts and Training Tips
read article
Why the Crowdstrike Incident is NOT Solely Crowdstrike’s Fault
read article
Featured ones: