Time Server
SHA-24

Here, we are committed to providing the latest information and tutorials on cyber security. This site is designed to help you better understand the world of cyber security and develop the skills needed to protect your data and systems from online threats.

New Post

Reverse Engineering

Reverse Engineering in Cyber Security

Syukra

Reverse engineering is the process of analyzing the structure, function, and behavior of software or hardware in order to understand how it works without …

HackerOne

Program Bug Bounty Hackerone

Syukra

In the increasingly advanced digital era, data security is a top priority for many companies and organizations. The emergence of increasingly complex cyber …

Static Website and Dynamic Website

Understanding Static Websites and Dynamic Websites: What's the Difference?

Syukra

A website is a collection of interconnected pages that can be accessed via the internet. In the world of the web, there are two main types of websites that we …

Voice Phishing

Voice Phishing: Definition, How It Works, and Tips to Avoid It

Syukra

Voice phishing, or often known as vishing, is a type of fraud via telephone calls designed to obtain sensitive information from its victims. Phishing is a …

Pengertian Python

Understanding Python in Programming

Syukra

Python is a very popular and versatile programming language, known for its clean syntax and ease of use. Developed by Guido van Rossum and first released in …

XSS Attack

What is an XSS Attack? And How to Deal with It?

Syukra

In the world of web security, Cross-Site Scripting (XSS) is one of the most common and potentially damaging types of attacks. XSS is a type of attack in which …