Jayant yadavforBreachForcebreachforce.net·Dec 14, 2024Ransomware : The Growing ThreatToday, ransomware attacks have become one of the most destructive cyber threats we face. These attacks disrupt operations, steal sensitive data, and cause millions of dollars in damages. Whether in healthcare, finance or any sector; no industry is le...1 likeREvil
Riya Sanderriyasander.hashnode.dev·Oct 18, 2024Is Remote Code Execution the Same as Code Injection?Everyone knows that cybersecurity threats are growing and becoming more sophisticated each day. So the organization and developers now know about the different kinds of attackers. When it comes to vulnerabilities in applications, two key threats are ...Remote Code Execution
Harshal Shahdelvingwithharshal.hashnode.dev·Oct 2, 2024Directory Traversal Attacks Explained: How to Detect and Stop ThemDirectory Traversal, also known as Path Traversal, is a serious web vulnerability that allows attackers to gain unauthorized access to the server’s filesystem by manipulating input paths. By exploiting this vulnerability, an attacker can access files...Fortify and Defend: Navigating the Cybersecurity Landscapebugbounty
J3bitokjebitok.hashnode.dev·Sep 8, 2024Cybersecurity Awareness: Common Attacks (TryHackMe)What was the original target of Stuxnet? The Iran Nuclear Programme The static site will display a series of emails and text messages. You will be asked to identify which of these messages are genuine and which are phishing attempts. Once you have s...39 reads#cybersecurity
sudip adhikarisudip007.hashnode.dev·Aug 23, 2024Cyber AttackWhat is Cyber Attack ? A cyber attack is any intentional effort by hackers to steal, expose, alter, disable, or destroy data, applications, or other assets by gaining unauthorized access to computer systems, networks, or digital devices. Imagine your...#cybersecurity
Maxwell Antwi Bosiakocybermonday.hashnode.dev·Aug 5, 2024Understanding Phishing Attacks: How to Recognize and Avoid ThemIn today's digital age, phishing attacks have become a prevalent threat to our online security. In the first quarter of 2024, online industries were most targeted by phishing attacks, with over 37% of these attacks on social media. These deceptive at...1 like#PhishingAttacks
Anjanesh Lekshminarayanananjanesh.dev·May 4, 2024Using token in vanilla PHP for CSRFFrameworks like Django and Laravel have CSRF Protection by default. Most of use it by their default behaviour in our jinja2 / blade templates and it just works. Super easy to make use of it and we need to write 0 code to implement the security bit on...109 readscsrf
Reza Rashidirezaduty-1685945445294.hashnode.dev·Nov 20, 2023Attacking Against DevOps EnvironmentSCM AUTHENTICATION Commands: 1. git clone 2. git log Example Commands: GitRob: - Command: gitrob <organization/repo> - Example: gitrob acme-corp/website - GitLeaks: - Command: gitleaks --repo-path <path-to-repo> - Example: gitleaks --repo-path ~/pro...2.3K readsDevops
BuildBearbuildbear.hashnode.dev·Sep 8, 2023Most Common Vulnerabilities In Solidity: In-Depth Part 2This article will guide you through some of the most common vulnerabilities in Solidity, including Flashloan, overflow and underflow, tx.origin, Insecure Randomness, and Improper Input Validation Attacks. If you haven’t already, please check out Part...Solidity
BuildBearbuildbear.hashnode.dev·Sep 8, 2023Most Common Vulnerabilities In Solidity: In-Depth Part 1This article will walk you through some of the most common vulnerabilities in Solidity, such as Reentrancy, Incorrect Calculations, Oracle Failure/Manipulation, Weak Access Control, and Frontrunning Attacks. Not only that, but we’ll guide you on the ...Solidity