Your cart is currently empty!
-
Cross Scripting (XXS) Attacks
Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code. The web page
-
Zero-day threats
Zero-day threats represent one of the most menacing and elusive cybersecurity challenges in our digital age. These threats derive their name from the fact that they exploit vulnerabilities in software, hardware, or network systems on the very day they are discovered, providing virtually zero time for defenders to prepare and patch against them. In essence,
-
USB attacks
USB drives, once a humble tool for data storage and transfer, have undergone a remarkable evolution over the years. These compact devices have become indispensable in our daily lives, but their advancements have not gone unnoticed by cybercriminals who have leveraged them for nefarious purposes. The Stuxnet worm, one of the most infamous examples, shed
-
Securing our seniors
Our seniors, often less familiar with the complexities of the digital world, find themselves vulnerable to a plethora of online threats. Cybercriminals, adept at exploiting trust and inexperience, target them through scams, phishing schemes, and deceitful websites. Protecting our seniors online thus becomes a vital defence against financial losses and the harrowing spectre of identity
-
Been phishing lately?
In the ever-evolving landscape of cybersecurity threats, “phishing” stands out as one of the most pervasive and insidious tactics employed by cybercriminals. Phishing attacks are deceptive and rely on the manipulation of human psychology to compromise sensitive information, making them a constant menace to individuals and organisations alike. At its core, phishing involves the use
-
Don’t click Ruslana’s links
Ransomware has emerged as one of the most pervasive and damaging cybersecurity threats in recent years. This malicious software, which encrypts a victim’s data and demands a ransom in exchange for the decryption key, has wreaked havoc on individuals, businesses, and even government organisations. Its ability to disrupt operations, compromise sensitive information, and extort large
-
All Aboard The Aiki Train!
Do you ever feel like you have a guardian angel? Or the universe is trying to tell you something? Well this is a story about a lot of things, in reality it is about how I feel like I am on the right track with AIki Cloud. I have built AIki Cloud up from the
-
Move Bigger!
What does that even mean? Well I need to step back a bit and give you an overview of Daito Ryu. In Daito Ryu we have 3 different categorisations of waza: Now in modern times these have kind been artificially separated into almost different densho, but it wasn’t originally like that. These concepts are from
-
Hiji Ryoku
This post first started as a basic post regarding an aiki rensei that comes from 11th Book which basically teaches hiji ryoku (่ๅ), or elbow power. It is also referred to as hiji ryoku no yorei (่ๅใ้คๆ) in other lines, but Amatsu sensei only ever said just elbow power. But we will get back to
-
Amatsu Senseiโs Jo Aiki
This post is both a promotion and celebration of the founding of Aiki Cloud. I would like to show the power of this platform for people who would like to learn real aiki from Amatsu den Daito Ryu Aikijujutsu. You can see below that I would like to talk about Amatsu senseiโs aiki with the