top of page
![Malicious scripts](https://static.wixstatic.com/media/a06cfa_f3dcc9f267d84af3ac4e547a3134fab5~mv2.png/v1/fill/w_300,h_168,fp_0.50_0.50,q_95,enc_auto/a06cfa_f3dcc9f267d84af3ac4e547a3134fab5~mv2.webp)
Dr. Afsaneh Javadi
2 min read
Malicious scripts
People all over the world who work with technology use scripting and automation to make their tasks quicker and better. They often create...
![What is Advanced Persistent Threats(APT) organization?](https://static.wixstatic.com/media/a06cfa_4b1b1181721146ad9d69796e6c26a630~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/a06cfa_4b1b1181721146ad9d69796e6c26a630~mv2.webp)
Dr. Afsaneh Javadi
2 min read
What is Advanced Persistent Threats(APT) organization?
APTs, or Advanced Persistent Threats, refer to highly sophisticated and targeted cyberattacks carried out by organized groups or...
![Application Security](https://static.wixstatic.com/media/a06cfa_020fd68f694a4eb4aaa3d7c6732838f4~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/a06cfa_020fd68f694a4eb4aaa3d7c6732838f4~mv2.webp)
Dr. Afsaneh Javadi
6 min read
Application Security
By Sahithi Reddy Baddam, Anusha Nelluri Application is a program/software designed for the end users to perform activities. Users will be...
bottom of page