Pasindu Bandara AththanayakaGolden Ticket AttackIn the world of cyber security, attacks are getting more sophisticated as hackers find new ways to break into computer networks. One such…Apr 22Apr 22
Pasindu Bandara AththanayakaThe Unforeseen: Emergent Behavior in AIArtificial intelligence has rapidly evolved, surpassing human capabilities in specific tasks and showcasing remarkable learning potential…Mar 3Mar 3
Pasindu Bandara AththanayakaDecoding Genius: Alan Turing’s Cryptographic OdysseyIn the chronicles of history, certain individuals leave an enduring mark on the world, and among them, Alan Turing stands as a shining…Aug 23, 2023Aug 23, 2023
Pasindu Bandara AththanayakaThe power of Blue TeamingCybersecurity has become one of the most pressing concerns for organizations in the modern age. As more companies move their operations…Feb 2, 2023Feb 2, 2023
Pasindu Bandara AththanayakaBeyond Penetration Testing: Red TeamingRed teaming is a powerful tool for organizations to identify vulnerabilities and weaknesses in their systems and processes. It involves…Jan 26, 2023Jan 26, 2023
Pasindu Bandara AththanayakaSocial Engineering: The Art of exploiting humansWhat is Social EngineeringJul 14, 2022Jul 14, 2022
Pasindu Bandara AththanayakaDeepfake TechnologyThe present-day digital technologies make it harder and harder for the human brain capacity to detect what are the real technologies and…Aug 1, 2021Aug 1, 2021
Pasindu Bandara AththanayakaIntroduction to Kali LinuxKali Linux is an operating system based on another free operating system called Debian. Kali Linux specially developed for information…Feb 18, 2021Feb 18, 2021