top of page
Connecting to the EWS with Python using Exchangelib
Operating system used: macOs Catalina Version 10.15.5 Python Version: Python3 What is an Exchange Web Service? So before we even begin,...
How do you scan your mailbox rules for vulnerability?
What are mailbox Rules? Using mailbox rules allows the automation of specific actions on your email accounts incoming and outgoing...
The Whitelisting Guide for HacWare Training emails in Gmail
To ensure your HacWare training emails are getting delivered to your GMail users, please follow Part 1, Part 2, and Part 3 of this guide....
3 Reasons Why Secure Coding is Important to Security Awareness
Reason #1 - Code Repository Security It is poor practice for developers to commit secrets and credentials into their remote repositories....
Secure Coding Best Practices for Microservice Architectures
The pace of transition from monolithic architectures towards microservice-based applications is on an uptrend. However, under this new...
Connecting to Microsoft 365 using Python
In this article, we will discuss how to connect to Microsoft Office 365 using python.
How to set up DMARC for Small Businesses
What is DMARC? Domain-Based Message Authentication, Reporting, and Conformance (DMARC) is a common email authentication and reporting...
How to start a Security Awareness Program for a Small Business in 4 Steps?
What is Security Awareness? Security awareness describes the knowledge and attitude of the workforce of an organization about the...
Top 3 Ways to Secure your API
Security is a vital part of any software. Application Programming Interfaces (APIs) are no exception. Due to APIs' advantages to the data...
How to Dark Web Scan your Small Business
What is the Dark Web? The dark web is a part of the internet that is not indexed by search engines and can only be accessed through a...
How to Detect Keys in Git?
Why is it bad to store keys and logins into my code? A common problem in developing and deploying applications is that developers often...
How to Scan Python Code for Security Vulnerabilities
Code Security As the world is becoming more aware of cybersecurity threats, software developers must also be mindful of the security...
bottom of page