Cyber Seklercybersekler.com·Nov 28, 2023The Bug Hunter's Methodology Live Course ReviewI’ve recently completed Jason Haddix’s two-day live course and wanted to share my insights and address any questions you might have. Before diving in, you can find the course here. Additionally, if you’d like a glimpse into the incredible Discord com...Discuss·125 readshacking
Panagiotis Vasilikossecuringbits.com·Nov 22, 2023Hacking a US AirlineA story about how I hacked a US airline with the help of Youtube ✈️🔓🎥Discussbugbounty
Gilad Maayangmagile.hashnode.dev·Nov 20, 2023Application Security Testing: 5 Tips for SuccessWhat Is Application Security Testing? Application security testing (AST) aims to discover and address security vulnerabilities in software applications. Ensuring the security of applications has become a critical necessity for organizations. Applicat...DiscussApplication Security
muhammad zubairdev.muhammadzubair220.xyz·Nov 13, 2023Exploring AWS Cloud: A Roadmap from Beginner to ProIntroduction Welcome to the AWS Cloud journey! Let's embark on a learning adventure with AWS. Why AWS? #AWSAdvantage Discover why AWS is the preferred choice for cloud services. Explore the vast array of AWS offerings. Unveiling Cloud Termino...DiscussAWS
Panagiotis Vasilikossecuringbits.com·Nov 8, 2023Social Engineering AttacksDid you know that social engineering attacks have played a significant role in some of the most notorious cybersecurity breaches? 😮 Here are the 7 most common types of social engineering attacks 👇Discuss#cybersecurity
Muhammad Usamablog.beyonddevops.engineer·Nov 6, 2023AWS WAF, AWS Manage Rule, and Custom Rule, IP set, etc.AWS WAF helps you protect against common web exploits and bots that can affect availability, compromise security, or consume excessive resources. AWS WAF can protect two types of global (Cloudfront) and Regional resources like Steps of Creating W...DiscussAWS
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Oct 30, 2023OWASP API Security Top 10 2023API1:2023 - Broken Object Level Authorization 1 API2:2023 - Broken Authentication 5 API3:2023 - Broken Object Property Level Authorization 11 API4:2023 - Unrestricted Resource Consumption 18 API5:2023 - Broken Function Level Authorization 23 API6:202...Discuss·1.1K readsDevops
Reza RashidiforDevSecOpsGuidesdevsecopsguides.hashnode.dev·Oct 30, 2023OWASP API Security Top 10 2023API1:2023 - Broken Object Level Authorization 1 API2:2023 - Broken Authentication 5 API3:2023 - Broken Object Property Level Authorization 11 API4:2023 - Unrestricted Resource Consumption 18 API5:2023 - Broken Function Level Authorization 23 API6:202...DiscussDevSecOps
Panagiotis Vasilikossecuringbits.com·Oct 25, 2023Exploiting Trust: Malware's Deceptive TacticsEver wondered about the ways attackers exploit trust to unleash malware? Today's comic is inspired by the report "Deception at Scale: How Malware Abuses Trust," by Virus Total.Discuss#cybersecurity
Panagiotis Vasilikossecuringbits.com·Oct 18, 2023HTTP Parameter PollutionAre you safeguarding💂 your web app against HTTP Parameter Pollution (HPP)? Discover the silent danger☠️ in today's comic.Discussbugbountytips