Veitias Social Network Club Veitias Social Network Club
Search Results
See All Results
  • Join
    Sign In
    Sign Up
    Search

Search

Discover new people, create new connections and make new friends

  • News Feed
  • EXPLORE
  • Pages
  • Groups
  • Events
  • Blogs
  • Marketplace
  • Funding
  • Offers
  • Jobs
  • Movies
  • Games
  • Developers
  • Posts
  • Articles
  • Users
  • Pages
  • Groups
  • Events
  • Infosec Train added a photo
    2024-12-03 07:22:28 - Translate -
    Both XSS (Cross-Site Scripting) and CSRF (Cross-Site Request Forgery) are common web vulnerabilities, but they work in very different ways. Understanding their key differences is critical for secure coding practices! Check out this infographic to understand XSS vs CSRF Linkedin Sales Solutions Generate sales and close deals with Linkedin Sales Navigator

    More Info: - https://www.infosectrain.com/blog/top-tools-for-website-security-audit/

    #XSS #CSRF #WebSecurity #Cyber Security #SecureCoding #InfosecTrain #OWASP #CyberThreats #WebVulnerabilities
    Both XSS (Cross-Site Scripting) and CSRF (Cross-Site Request Forgery) are common web vulnerabilities, but they work in very different ways. Understanding their key differences is critical for secure coding practices! Check out this infographic to understand XSS vs CSRF Linkedin Sales Solutions Generate sales and close deals with Linkedin Sales Navigator More Info: - https://www.infosectrain.com/blog/top-tools-for-website-security-audit/ #XSS #CSRF #WebSecurity #Cyber Security #SecureCoding #InfosecTrain #OWASP #CyberThreats #WebVulnerabilities
    0 Comments 0 Shares 4205 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma added a photo
    2024-12-02 11:12:42 - Translate -
    𝐗𝐒𝐒 𝐯𝐬 𝐂𝐒𝐑𝐅 - 𝐖𝐡𝐚𝐭’𝐬 𝐭𝐡𝐞 𝐃𝐢𝐟𝐟𝐞𝐫𝐞𝐧𝐜𝐞?

    Both XSS (Cross-Site Scripting) and CSRF (Cross-Site Request Forgery) are common web vulnerabilities, but they work in very different ways. Understanding their key differences is critical for secure coding practices! Check out this infographic to understand XSS vs CSRF.

    #XSS #CSRF #WebSecurity #Cybersecurity #InfoSec #SecureCoding #WebAppSecurity #EthicalHacking #CyberThreats #SecurityAwareness #WebVulnerabilities #CyberDefense #PenTesting #CrossSiteScripting #CrossSiteRequestForgery #WebSecurityBestPractices #infosectrain
    𝐗𝐒𝐒 𝐯𝐬 𝐂𝐒𝐑𝐅 - 𝐖𝐡𝐚𝐭’𝐬 𝐭𝐡𝐞 𝐃𝐢𝐟𝐟𝐞𝐫𝐞𝐧𝐜𝐞? Both XSS (Cross-Site Scripting) and CSRF (Cross-Site Request Forgery) are common web vulnerabilities, but they work in very different ways. Understanding their key differences is critical for secure coding practices! Check out this infographic to understand XSS vs CSRF. #XSS #CSRF #WebSecurity #Cybersecurity #InfoSec #SecureCoding #WebAppSecurity #EthicalHacking #CyberThreats #SecurityAwareness #WebVulnerabilities #CyberDefense #PenTesting #CrossSiteScripting #CrossSiteRequestForgery #WebSecurityBestPractices #infosectrain
    0 Comments 0 Shares 6294 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma
    2024-04-09 09:45:47 - Translate -
    What is CSRF? | What is Cross Site Request Forgery with Example?

    Cross-Site Request Forgery (CSRF) is a type of cyber attack where an attacker tricks a user into unintentionally executing actions on a web application in which they are authenticated. The attacker crafts a malicious request that appears legitimate and uses the victim's active session to perform unauthorized actions without the victim's consent. This video aims to equip viewers with the knowledge to recognize and defend against CSRF attacks, contributing to a safer web environment for all users.

    Watch Here: https://youtu.be/GwWUr0MC87w?si=iwjbj-sLsbS0LZBV

    #CSRF #CrossSiteRequestForgery #WebSecurity #CyberSecurity #InfoSec #CyberSecInsights #WebVulnerabilities #SecurityAwareness #infosectrain #learntorise
    What is CSRF? | What is Cross Site Request Forgery with Example? Cross-Site Request Forgery (CSRF) is a type of cyber attack where an attacker tricks a user into unintentionally executing actions on a web application in which they are authenticated. The attacker crafts a malicious request that appears legitimate and uses the victim's active session to perform unauthorized actions without the victim's consent. This video aims to equip viewers with the knowledge to recognize and defend against CSRF attacks, contributing to a safer web environment for all users. Watch Here: https://youtu.be/GwWUr0MC87w?si=iwjbj-sLsbS0LZBV #CSRF #CrossSiteRequestForgery #WebSecurity #CyberSecurity #InfoSec #CyberSecInsights #WebVulnerabilities #SecurityAwareness #infosectrain #learntorise
    0 Comments 0 Shares 4051 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma shared a link
    2024-02-23 07:31:26 - Translate -
    What is Google Hacking Database (GHDB)?

    Have you ever thought about how much information is out there on the internet? and how it can be accessed, used, and in some cases, misused? The Google Hacking Database is a collection of search queries, also known as Google Dorks, that can be used to find sensitive information exposed on the internet. GHDB is a resource for cybersecurity professionals and ethical hackers to uncover sensitive information. It provides search queries and techniques to find publicly accessible data.

    Read Here: https://infosec-train.blogspot.com/2023/12/what-is-google-hacking-database-ghdb.html

    #GHDB #GoogleHackingDatabase #InfoSecResearch #GoogleDorking #GoogleHacking #WebSecurity #CyberSecurity #OSINT #OpenSourceIntelligence #GoogleQueries #InfoSecTools #GHDBExplained #DigitalSecurity #TechHacking #SearchQueries #WebVulnerabilities #HackingTechniques #SecurityResearch #TechDiscovery #InfoSecInsights #GoogleSearch #CyberAwareness #ExploitationTesting #infosectrain #learntorise
    What is Google Hacking Database (GHDB)? Have you ever thought about how much information is out there on the internet? and how it can be accessed, used, and in some cases, misused? The Google Hacking Database is a collection of search queries, also known as Google Dorks, that can be used to find sensitive information exposed on the internet. GHDB is a resource for cybersecurity professionals and ethical hackers to uncover sensitive information. It provides search queries and techniques to find publicly accessible data. Read Here: https://infosec-train.blogspot.com/2023/12/what-is-google-hacking-database-ghdb.html #GHDB #GoogleHackingDatabase #InfoSecResearch #GoogleDorking #GoogleHacking #WebSecurity #CyberSecurity #OSINT #OpenSourceIntelligence #GoogleQueries #InfoSecTools #GHDBExplained #DigitalSecurity #TechHacking #SearchQueries #WebVulnerabilities #HackingTechniques #SecurityResearch #TechDiscovery #InfoSecInsights #GoogleSearch #CyberAwareness #ExploitationTesting #infosectrain #learntorise
    INFOSEC-TRAIN.BLOGSPOT.COM
    What is Google Hacking Database (GHDB)?
    In an age where data is highly valuable, knowing how our digital footprints or online activities can be monitored or how our data can be acc...
    0 Comments 0 Shares 15503 Views 0 Reviews
    Please log in to like, share and comment!
© 2025 Veitias Social Network Club English
English Arabic French Spanish Portuguese Deutsch Turkish Dutch Italiano Russian Romaian Portuguese (Brazil) Greek
About Terms Privacy Contact Us Directory