Shellmates ClubShellmates Mentoring ProgramUnveiling the Shellmates Cybersecurity Club Mentoring Program: A Pathway to SuccessMar 18Mar 18
Shellmates ClubSecuring the Internet of Things: Protecting IoT Devices and DataReleased by : Ines Kellou, Dhikra CHEBIRA and Hanaa BOUDINASep 5, 2023Sep 5, 2023
Shellmates ClubUnveiling the Astonishing and Horrifying Power of Deepfakesreleased by our members : Ikram Zineb DEBBIH, Zaineb BOUKHETALA, Amira HADDADSep 3, 2023Sep 3, 2023
Shellmates ClubRansomware : The Silent Threat to Data Securityreleased by our members : Ait Si Amer Sara, Belharda Aya ,Mechitoua IkramSep 2, 2023Sep 2, 2023
Shellmates ClubDemystifying Cloud Security: Understanding Shared Responsibilities for a Secure InfrastructureReleased By: Aziz AissaAug 16, 2023Aug 16, 2023
Shellmates ClubThe Forensic Significance of the NTFS $I30 Filewritten by Chiheb Chahine YAICIJul 29, 2023Jul 29, 2023
Shellmates ClubOAuth 2.0 Authentication Misconfigurationwritten by Mohamed Lakhdar MetidjiJul 27, 2023Jul 27, 2023
Shellmates ClubYahoo Data Breach: An In-Depth Analysis of One of the Most Significant Data Breaches in HistoryWritten by Fatima zahra SENOUCIJul 23, 2023Jul 23, 2023
Shellmates ClubFacing Cybercrimes Using AI: How to Prevent Phishing Attacks ?written by Fadia BOUDIAFJul 20, 2023Jul 20, 2023
Shellmates ClubAmazon cognito misconfigurationwritten by Mohamed Lakhdar MetidjiMar 26, 2023Mar 26, 2023