--

--

--

Security Engineer |Security Consultant |Infosec Trainer | Author | Lecturer | Open Source Contributor | Learner https://www.linkedin.com/in/shivsahni/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Cyber Pandemic Wave — Two Golden Rules for ‘New Normal’ Cyber Awareness

Fraud Analytics in the Cloud: flexibility factors (3/3)

How to protect yourself from vulnerable npm packages.

Проект меня заинтересовал спонсорами и возможными будущими активностями, которые на данный момент…

Google CTF 2020 (Flag Shop)

{UPDATE} 联众疯狂德州 Hack Free Resources Generator

Understand Cryptography: The Best Way

Exchange Server attacks: Microsoft shares intelligence on post-compromise activities

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Shiv Sahni

Shiv Sahni

Security Engineer |Security Consultant |Infosec Trainer | Author | Lecturer | Open Source Contributor | Learner https://www.linkedin.com/in/shivsahni/

More from Medium

What is Apache Log4J Vulnerability and How to Prevent It?

Log4j Vulnerability

Api Security in CI/CD Process

Top 5 API Testing Methods to Secure Your Data

Is my Linux server vulnerable to Apache Log4j Vulnerability or CVE-2021–44228?