Skip to content

Desi banjara

learn and grow together

  • Ransomware – preventative measures, detection, and recovery Ransomware
  • 75 Best inspiring quotes on Leadership Business
  • Asp.Net WebApi Interview Questions ASP.NET Web API
  • Azure Machine Learning Azure Machine Learning
  • AWS Lambda Amazon Web Services (AWS)
  • Top 20 GIT Interview Questions GIT
  • Azure Migration Azure
  • Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS)

Category: Cybersecurity

Why cyber breaches are expected to increase?

Posted on March 10, 2023 By DesiBanjara No Comments on Why cyber breaches are expected to increase?

The rise of digital technology and interconnected devices has brought about many benefits, but it has also created new vulnerabilities and opportunities for cybercriminals. As businesses and individuals become more reliant on technology, cyber breaches are becoming more frequent, and the threats are becoming more sophisticated. One of the primary reasons why cyber breaches are…

Read More “Why cyber breaches are expected to increase?” »

cyber breaches, Cybersecurity

Ransomware – preventative measures, detection, and recovery

Posted on March 8, 2023 By DesiBanjara No Comments on Ransomware – preventative measures, detection, and recovery

Ransomware attacks have become a major threat to businesses and organisations worldwide. Ransomware is a type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key. These attacks have become increasingly common, and the costs associated with them can be significant. To protect against ransomware, it’s important to have…

Read More “Ransomware – preventative measures, detection, and recovery” »

Ransomware

DOM-based XSS

Posted on March 8, 2023 By DesiBanjara No Comments on DOM-based XSS

DOM-based XSS, also known as type-0 XSS or client-side XSS, is a type of cross-site scripting attack that occurs when the attacker can manipulate the DOM (Document Object Model) of a web page to inject and execute malicious code. Unlike Reflected XSS and Stored XSS, the attack payload is not sent to the server but…

Read More “DOM-based XSS” »

Cybersecurity, DOM-based XSS

Reflected XSS

Posted on March 8, 2023 By DesiBanjara No Comments on Reflected XSS

Reflected XSS, also known as non-persistent XSS, occurs when an attacker injects malicious code into a website and then tricks the victim into clicking on a specially crafted link that contains the injected code. When the victim clicks on the link, the malicious code is executed in the victim’s browser, allowing the attacker to steal…

Read More “Reflected XSS” »

Reflected XSS

What is Stored XSS?

Posted on March 8, 2023March 8, 2023 By DesiBanjara No Comments on What is Stored XSS?

Cross-Site Scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious code into a web application. There are different types of XSS attacks, including Reflected XSS, DOM-based XSS, and Stored XSS. In this article, we will focus on Stored XSS and provide examples of how it works. What is Stored XSS?…

Read More “What is Stored XSS?” »

Stored XSS attacks

Cross Site Scripting (XSS)

Posted on March 8, 2023March 8, 2023 By DesiBanjara No Comments on Cross Site Scripting (XSS)

Cross-site scripting (XSS) is a common vulnerability that affects web applications. It is caused by the injection of malicious scripts into a web page viewed by unsuspecting users. These scripts can be used to steal sensitive data, control the victim’s browser, or perform other nefarious actions. In this article, we will explore the different types…

Read More “Cross Site Scripting (XSS)” »

Cross Site Scripting (XSS), Cybersecurity

What is Cyber Security? Definition, Challenges & Best Practices

Posted on March 2, 2023March 3, 2023 By DesiBanjara No Comments on What is Cyber Security? Definition, Challenges & Best Practices

What is Cyber Security? Definition, Challenges & Best Practices Cyber security is a term used to describe the practices, technologies, and processes that are used to protect computer systems, networks, and data from unauthorised access, theft, or damage. Cyber security has become an increasingly important issue in recent years as more and more organisations rely…

Read More “What is Cyber Security? Definition, Challenges & Best Practices” »

Cybersecurity



Archives

  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • March 2022
  • February 2022
  • June 2021
  • March 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • July 2020
  • June 2020
  • April 2020
  • December 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • September 2017
  • July 2017
  • May 2017
  • April 2017
  • November 2013

Categories

  • Agile Software development
  • Agile Software development
  • Amazon AWS Certification Exam
  • Amazon EC2
  • Amazon ECS
  • Amazon Web Services
  • Amazon Web Services (AWS)
  • Apache Kafka
  • API development
  • ASP.NET Core
  • ASP.Net MVC
  • ASP.NET Web API
  • Atlassian Jira
  • AWS DevOps Engineer Professional Exam
  • AWS Lambda
  • AZ-300: Microsoft Azure Architect Technologies Exam
  • Azure
  • Azure Active Directory
  • Azure AI and ML services
  • Azure App Service
  • Azure App Services
  • Azure Cognitive Services
  • Azure Compute
  • Azure Data and Storage
  • Azure Data Factory
  • Azure Data Lake Storage
  • Azure Databricks
  • Azure Databricks
  • Azure Defender
  • Azure Devops
  • Azure Functions
  • Azure IaaS
  • Azure Internet of Things (IoT)
  • Azure landing zone
  • Azure Logic Apps
  • Azure Machine Learning
  • Azure Machine Learning
  • Azure Migration
  • Azure Mobile Apps
  • Azure Networking – VNET
  • Azure Networking services
  • Azure Security
  • Azure Security
  • Azure security tools for logging and monitoring
  • Azure Sentinel
  • Azure Sentinel – Data connectors
  • Azure Serverless Computing
  • Azure SQL
  • Azure SQL Database
  • Azure Storage
  • Azure Stream Analytics
  • Azure Synapse Analytics
  • Azure Virtual Machine
  • Azure VNET
  • Business
  • C# development
  • C# interview questions with answers
  • ChatGPT
  • CI/CD pipeline
  • CISSP certification
  • Cloud
  • Cloud computing
  • Cloud services
  • COBIT
  • Command Query Responsibility Segregation (CQRS) Pattern
  • Continuous Integration
  • conversational AI
  • Cross Site Scripting (XSS)
  • cyber breaches
  • Cybersecurity
  • Data Analysis
  • Database
  • DevOps
  • DevSecOps
  • DOM-based XSS
  • Domain-Driven Design (DDD)
  • Dynamic Application Security Testing (DAST)
  • Enterprise application architecture
  • Event-Driven Architecture
  • GIT
  • gmail api
  • Google
  • Google Ads
  • Google AdSense
  • Google Analytics
  • Google analytics interview questions with answers
  • Google Cloud Platform (GCP)
  • Google Docs
  • Google Drive
  • Google search console
  • HTML
  • Information security
  • Infrastructure as a Service (IaaS)
  • Internet of Things (IoT)
  • Interview questions
  • IT governance
  • IT Infrastructure networking
  • IT/Software development
  • Javascript interview questions with answers
  • Layered Pattern
  • Leadership Quote
  • Life lessons
  • Low-code development platform
  • Microservices
  • Microservices
  • Microsoft
  • Microsoft 365 Defender
  • Microsoft AI-900 Certification Exam
  • Microsoft AZ-104 Certification Exam
  • Microsoft AZ-204 Certification Exam
  • Microsoft AZ-900 Certification Exam
  • Microsoft Azure
  • Microsoft Azure certifications
  • Microsoft Azure Log Analytics
  • Microsoft Cloud Adoption Framework
  • Microsoft Exam AZ-220
  • Microsoft Exam AZ-400
  • Microsoft Excel
  • Microsoft Office
  • Microsoft Teams
  • Microsoft word
  • Model-View-Controller (MVC) Pattern
  • Monitoring and analytics
  • NoSQL
  • OpenAI
  • OutSystems
  • PL-100: Microsoft Power Platform App Maker
  • PL-200: Microsoft Power Platform Functional Consultant Certification
  • PL-900: Microsoft Power Platform Fundamentals
  • Platform as a Service (PaaS)
  • postman
  • Postman
  • Project management
  • Python interview questions with answers
  • Ransomware
  • Reflected XSS
  • RESTful APIs
  • SC-100: Microsoft Cybersecurity Architect
  • Scrum Master Certification
  • Service-oriented architecture (SOA)
  • Software architecture
  • Software as a Service (SaaS)
  • SonarQube
  • Splunk
  • SQL
  • SQL Azure Table
  • SQL Server
  • Static Application Security Testing (SAST)
  • Stored XSS attacks
  • Table Storage
  • Test Driven Development (TDD)
  • Top technology trends for 2023
  • User Experience (UX) design
  • WCF (Windows Communication Foundation)
  • Web development
  • Zero Trust strategy



Recent Posts

  • Command Query Responsibility Segregation (CQRS) Pattern
  • Dynamic Application Security Testing (DAST)
  • Static Application Security Testing (SAST)
  • Infrastructure as Code (IaC)
  • Continuous Integration/Continuous Deployment (CI/CD)

Recent Comments

    • ASP.NET MVC: How to show html data from database to front end view ASP.Net MVC
    • Interview question: What is the difference between ref and out parameters? C# development
    • Microsoft AZ-900 Certification Exam Practice Questions – Part 1 Microsoft AZ-900 Certification Exam
    • What is DOM (Document Object Model) in HTML? HTML
    • Interview question: What are the namespaces in C#.NET? C# development
    • What is OpenAI? OpenAI
    • Microsoft AI-900 Certification Exam Practice Questions -3 Microsoft AI-900 Certification Exam
    • Microsoft AZ-104 Certification Exam Practice Questions – 2 Microsoft AZ-104 Certification Exam

    Copyright © 2023 Desi banjara.

    Powered by PressBook News WordPress theme