Taking a look at what OWASP had in regards to this, we will look at the threat agents and attack vectors, as well as the impacts. “Exploitation of insufficient logging and monitoring is the bedrock of nearly every major incident. Attackers rely on the lack of monitoring and timely response to achieve their goals without …
using components with known vulnerabilities
Really all you need to know is from there the above, but we are going to go as in-depth as possible using the provided link from OWASP here. To start we will look at the threat agents and attack vectors as well as the impacts. “While it is easy to find already-written exploits for many …
Brave the forefront of web 3.0
The Brave web browser is a complete game changer for how everyone will be using the web. Every day more and more people are learning about cryptocurrencies, decentralizing the web and the benefits that come with having a decentralized web. Back in 2008 the chrome web browser launched and it took the world by storm. …

