Hansindu ManiyangamainInfoSec Write-upsIdentify Malware Threats: Malware Terminology (Part 2)This is the part II of my Malware Terminology blog series.🥰 In my previous blog Identify Malware Threats: Malware Terminology (Part 1…7 min read·Jul 2, 2021----
Hansindu ManiyangamainInfoSec Write-upsHow to enable Azure Multi-Factor AuthenticationThis blog contains a walkthrough of How to secure user sign-in events with Azure AD Multi-Factor Authentication.5 min read·Mar 13, 2021----
Hansindu ManiyangamainInfoSec Write-upsWhat do you know of Security in Azure? |Azure Security Practices ☁️Let’s look at the problem, what is it really what we are trying to secure when talking about azure 🤗The best way to look into these…5 min read·Mar 10, 2021----
Hansindu ManiyangamainInfoSec Write-upsIdentify Malware Threats: Malware Terminology (Part 1: Viruses and Worms)With the arising technology in the world, the main impact of cybersecurity in the IT industry is malware. As the new technology is…5 min read·Feb 15, 2021----
Hansindu ManiyangamainInfoSec Write-upsHow to start Bug Bounty?Simple Methodology to follow when starting bug bounty5 min read·Nov 5, 2020----