Fix IDOR vulnerability: A Beginner’s Guide to Insecure Direct Object Reference
If you’re a developer, the security of your application is your responsibility. One of...
If you’re a developer, the security of your application is your responsibility. One of...
Introduction: Cyber security in Morocco Morocco is undergoing a profound digital transformation. Under the...
Is VPN Safe? A common idea is that “I’m using a VPN, so I’m...
The Myth of Bitcoin Anonymity A common misconception in the digital currency world is...
Introduction: Block Bots from Website Websites are constantly targeted by bots. Some bots serve...
Introduction : 🔐 Hack WiFi in Morocco Whether you’re using TP-Link, Inwi Home, WiFi...
Introduction : Fake Orders From Ads Most businesses rely heavily on paid ads to...
Introduction : Cyber Extortion Cyber extortion is becoming increasingly prevalent. With the rise of...
The CNSS hack exposed sensitive data of millions of Moroccan citizens and companies. Learn...
Introduction ENS Hack Recently, the website of the École Normale Supérieure de Casablanca (ENS)...