Open in app

Sign In

Write

Sign In

CSCC LABS
CSCC LABS

78 Followers

Home

About

Oct 19, 2022

Internet Safety Recommendations

When you use the internet, you may be connected to thousands of other computers that you exchange information and data with, including personal details. It is important to make sure your device, your information and your privacy are as secure as possible. Some simple precautions will keep you safe online. …

Internet

3 min read

Internet Safety Recommendations
Internet Safety Recommendations
Internet

3 min read


Oct 17, 2022

IoT Security

To build a “smart home,” more and more of our household appliances, such as thermostats, coffee makers, outdoor lighting, door locks, and smoke alarms, are connected to the internet. …

Internet Of Things

2 min read

IoT Security
IoT Security
Internet Of Things

2 min read


Oct 13, 2022

Cyber Security Awareness Month

Stop phishing: Make a cybercriminal’s day miserable! Every October, the public can learn more about the significance of cyber security through Cyber Month, an internationally renowned campaign. By educating them on easy ways to safeguard themselves and their devices to stay safe online. …

Cybersecurity

2 min read

Cyber Security Awareness Month
Cyber Security Awareness Month
Cybersecurity

2 min read


Oct 11, 2022

Cyber Security Awareness Month

Ransomware — Tips Imagine: One morning, when you go onto your work computer, you discover that all of your correspondence, crucial files, and data have vanished. Your company is unable to run. Your phone is exploding with calls from annoyed clients. …

Cybersecurity

2 min read

Cyber Security Awareness Month
Cyber Security Awareness Month
Cybersecurity

2 min read


Jun 1, 2022

Securing IT Assets in Manufacturing Industry

Manufacturing Industries poses a significant security risk. Endpoint security, firewalls, and corporate security rules are already in place. Is there anything more we require? Manufacturing has been a significant target. In fact, in 2020, it was the second-most-attacked industry, up from ninth the year before. …

Cybersecurity

2 min read

Securing IT Assets in Manufacturing Industry
Securing IT Assets in Manufacturing Industry
Cybersecurity

2 min read


May 30, 2022

How to handle Ransomware attack?

What is Ransomware? Ransomware is a type of malware that prevents or limits users from accessing their system, often encrypting data in an unrecoverable fashion. Ransomware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems or to get their data back. Types of Ransomware The…

Ransomware

4 min read

How to handle Ransomware attack?
How to handle Ransomware attack?
Ransomware

4 min read


May 18, 2022

Cybersecurity Cockpit — A Pilot View

You might have seen a cockpit either in the real world or in the movies which offers visibility to the front and sides and also houses the pilot(s) and other crew members. …

Cyber Security Services

3 min read

Cybersecurity Cockpit — A Pilot View
Cybersecurity Cockpit — A Pilot View
Cyber Security Services

3 min read


Mar 22, 2022

Path Traversal or Remote Code Execution in Apache 2.4.49 and 2.4.50

This document aims at explaining some recent vulnerabilities in Apache HTTP Server that lead to attacks like Path Traversal and Remote Code Execution. A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49,2.4.50. Vulnerability details: A flaw was found in a change made to…

Apache

4 min read

Path Traversal or Remote Code Execution in Apache 2.4.49 and 2.4.50
Path Traversal or Remote Code Execution in Apache 2.4.49 and 2.4.50
Apache

4 min read


Mar 17, 2022

Log4j Vulnerability

On December 9th, 2021, the world was made aware of the single, biggest, most critical vulnerability as CVE-2021–44228, affecting the java based logging utility log4j. What Is Log4j? Log4j is also known as Log4Shell, an internet vulnerability that affects millions of computers, involving an obscure but nearly ubiquitous piece of…

Log4j

6 min read

Log4j Vulnerability
Log4j Vulnerability
Log4j

6 min read


May 25, 2021

Build Your Own Captcha With PHP

CAPTCHA stands for Completely Automated Public Turing Test to Tell Computers and Humans Apart. The use of web services has increased along with the chances of malicious robot attacks. Captcha system prevents websites from various bot attacks. A good quality captcha system must have the following characteristics: Content can be…

PHP

3 min read

Build Your Own Captcha With PHP
Build Your Own Captcha With PHP
PHP

3 min read

CSCC LABS

CSCC LABS

78 Followers

Cybersecurity Comprehensive Coverage

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech