As long as humans are involved in a company, its security will remain as foolproof as their behaviour. Itق€™s...
Archive for category: Blog
The Anatomy Of A Cyber Attack : An introduction to the most common types of cyberattacks.
Tech Brewery , , Cyber Security , Tech Brewery Staff , Cyberattacks , DOS , Drive by attack , Malware , Phishing , SOL Injection , XSS , 0 5 minute readIf all the people moved to the city, what would the thieves do in village? With increasing digitisation, cyber...
Hacking 101 : How to set up Kali Linux and a brief introduction
Tech Brewery , , All about Hacking , Tech Brewery Staff , Install kali linux , Set up kali linux , 0 5 minute readHackers, aspiring hackers, techies, curious people, Mr. Robot fans, all of you! Pay attention. This is your where you...
23 commandments in Kali : The most useful Kali Linux commands
Tech Brewery , , All about Hacking , Tech Brewery Staff , commands , kali linux , 1 6 minute readPresenting to you the most basic and the most useful terminal commands in Kali Linux. May you learn them,...
Know where to look : 10 most useful OSINT tools for beginners
Tech Brewery , , Cyber Security , Tech Brewery Staff , OSINT , tools , Top 10 useful , 0 7 minute readThe world wide web is a deep space overflowing with data and a lot of it is public and...
Stop here for Metasploit : Learn how to tame the beast of hacking
Tech Brewery , , All about Hacking , Tech Brewery Staff , Learn Metasploit , 0By the end of this article, you will walk out with a working understanding of Metasploit. Your hands will...
Why 6.8 m Indian health records were stolen : Is healthcare the new target in town
Tech Brewery , , Crime Stories , Tech Brewery Staff , Health records stolen , Indian health records , 0Earlier this year in February, a shocking, but not uncommon cyber crime incident was unveiled to public, about a...
Why you shouldnق€™t choose cybersecurity as a career : Must read career guidance on cybersecurity
Tech Brewery , , Grow your Career , Tech Brewery Staff , Cyber security career , cyber security courses , jobs , scope , 0I donق€™t know if cybersecurity is the right thing for me. I donق€™t know if this field has enough...
What does that even mean : Decoding hacking jargon through 50 most common cybersecurity terms
Tech Brewery , , All about Hacking , Tech Brewery Staff , 50 most common , cyber security terms , Decoding hacking , 0 7 minute readHave you ever heard someone throw words like botnet, shell, zero day exploit, metadata in a conversation and simple...
How not to attract cyberattacks : Online Security Training for netizens
Tech Brewery , , Cyber Security , Tech Brewery Staff , Cyber attacks , Online security training , 0 6 minute readThe internet is a hot commodity in the 21st century. Everyone wants to get on the online bandwagon and...