CyberSecurity Blog
On this website, I share cybersecurity tools, methodologies and strategies.
Last Posts
Broken Access Control – TOP 1 Vulnerability Web
Broken Access Control is the TOP 1 vulnerability in the OWASP ranking . We will…
Subdomain Enumeration: How to Expand the Attack Surface
Subdomain enumeration aims at finding subdomains from a given domain. This strategy is an important…
Concepts required to start in cybersecurity
In this post, we review the basic concepts that are needed to start cybersecurity. This…