PinnedKapeed10 Best OSINT Research Tools for Threat IntelligenceOSINT (Open Source Intelligence) refers to the practice of gathering, analyzing, and using publicly available information for intelligence…Dec 26, 2022Dec 26, 2022
KapeedOT/IACS Industries and Your RoleThis article is Part 3 of the article: Why Industrial and OT Cyber security Should Be Your Next Career MoveMar 17Mar 17
KapeedWhy Choose Industrial and OT Cyber security?This article is Part 2 of the article: Why Industrial and OT Cyber security Should Be Your Next Career MoveMar 17Mar 17
KapeedWhy Industrial and OT Cyber security Should Be Your Next Career MoveIn today’s cyber security landscape, protecting digital assets and data within the field of information technology (IT) requires…Mar 17Mar 17
KapeedBAU Risk Assessment: An OverviewBAU stands for “business as usual”. It refers to the day-to-day operations and routines of a company or organization. It is used to…Jan 25, 2023Jan 25, 2023
KapeedPassword Attacks: Types and PreventionIn this blog, I will discuss the different types of password attacks that can be used to gain unauthorized access to sensitive information.Jan 19, 2023Jan 19, 2023
KapeedSQL Injection: Exploitation, Detection and PreventionSQL injection is a type of cyber attack in which an attacker injects malicious code into a website’s Structured Query Language (SQL)…Jan 2, 2023Jan 2, 2023