Please encrypt your important files to ensure confidentiality at all times.
Cyber kill chain in a fintech environment
Common vulnerabilities in web applications based on OWASP Top 10
How such vulnerabilities could be discovered in real world web applications
How a successful kill-chain could be designed by chaining the vulnerabilities for remote code execution
If you would like to explore the environment on NCL testbed for your projects/research,please reach out to dcsacr@nus.edu.sg for more information!