top of page


Why Both Application Security and API Security are Critical for Your Business
the importance of application security and API security cannot be overstated. With the surge of mobile devices and Internet-connected

Nexix Security Labs
Mar 2, 20233 min read


The importance of Strong, Secure Passwords
Users must be aware of certain password security aspects in order to limit the chances of a hacker cracking their password and gaining acces

Nexix Security Labs
May 23, 20224 min read


Verblecon Malware Loader Used in Stealthy Cryptomining Attacks
Security researchers are warning of a new malware loader known as Verblecon, which is complicated and powerful enough for ransomware...

Nexix Security Labs
Apr 12, 20223 min read


How to secure NFTs?
NFTs are secure, but they can still be stolen, just like your bank credentials. Why?

Nexix Security Labs
Mar 31, 20223 min read


How To Safely Use Public Wi-Fi
If you want to be secure while using public Wi-Fi, you must first understand the hazards. We created a list to assist you to identify the 7

Nexix Security Labs
Feb 10, 20226 min read


Linux Kernel Bug Found and Fixed
The flaws were discovered in the kernel code that handles iSCSI, a component that allows you to communicate with SCSI devices

Nexix Security Labs
Feb 1, 20225 min read


Log4j Software Vulnerability
Log4Shell, a new vulnerability, is being hailed as one of the biggest cybersecurity weaknesses ever identified.

Nexix Security Labs
Dec 16, 20213 min read


The Great Firewall of China
Anyone who has visited China knows that certain international websites, such as Google and YouTube, are either blocked or deliberately...

Nexix Security Labs
Dec 13, 20216 min read


The Rise In Automotive Hacking
Automotive hacking is the practice of exploiting vulnerabilities in automotive software, hardware, and communication systems.

Nexix Security Labs
Dec 2, 20214 min read


FBI's Email System Hacked!
The fake emails were sent using the Law Enforcement Enterprise Portal system, which is used to connect with state and local officials, rathe

Nexix Security Labs
Nov 25, 20213 min read


What is Cryptojacking and How does it work?
Cryptojacking is a sort of cybercrime in which a criminal secretly generates cryptocurrency using the computing power of a victim.

Nexix Security Labs
Nov 9, 20212 min read


INSIDER THREATS
Insider threats in cyber security are threats possessed by individuals from within an organization, such as current or former employees

Nexix Security Labs
Nov 1, 20213 min read


Netgear: Authentication Bypass Vulnerability
The Netgear authentication bypass vulnerability was the susceptibility identified on the Netgear devices before version 1.0.0.32 that has in

Nexix Security Labs
Oct 16, 20213 min read


SolarWinds Hack: Everything you need to know
SolarWinds is the subject of a massive cybersecurity attack that spread to the company’s clients. Not a single company but series

Nexix Security Labs
Oct 4, 20213 min read


What is Dark Web? Is it dangerous? How to access it?
The Dark Web’s infrastructure was created in the 1970s likely to that of the internet.

Nexix Security Labs
Sep 22, 20213 min read


Pegasus Spyware: What is it? How does it infect your Device?
Created by NSO Group, an Israeli tech firm, Pegasus Spyware was created to help governments, investigation agencies to target bad elements

Nexix Security Labs
Sep 7, 20212 min read


How Google Tracks You
Privacy has become a big phenomena in a society where everyone is overexposed. The majority of us value our privacy and don't want people...

Nexix Security Labs
Jul 31, 20212 min read


Web Application Attacks
Significant weaknesses or vulnerabilities let the crooks receive direct and public access to databases to bucket up sensitive data...

Nexix Security Labs
Jul 22, 20213 min read


What Is a Phishing Attack? How it works and Types
The tactic of garnering sensitive information of a target like a username, password, email-ID, mobile number, etc., or other sensitive infor

Nexix Security Labs
Jul 14, 20213 min read
bottom of page