Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Nov 27, 2024How Hackers Use Command Execution to Break Into SystemsWhen learning about cybersecurity, you’ll quickly realize that some vulnerabilities are more dangerous than others. One of the most serious ones is called command execution. Hackers use it to run harmful commands on a system, gain access to sensitiv...#cybersecurity
Ahmed Razaahmedrazadev.hashnode.dev·Nov 24, 2024Understanding Cyber Attacks: Threats, Impacts, and Notable IncidentsIn today’s hyper-connected world, where information is exchanged at an unprecedented scale and speed, the threat of cyber attacks has become a critical issue for individuals, businesses, and governments alike. A cyber attack refers to any deliberate ...#cybersecurity
Shruti RajeshforZySec AIblog.zysec.ai·Oct 19, 2024October 2024 Cybersecurity Legislation: The Legal Plot Thickens!Welcome, dear readers, to the latest episode of “As the Legislation Turns,” where we explore the dramatic twists in cybersecurity laws with the flair of a courtroom drama and just a hint of legal comedy. Grab your gavels and popcorn, because here’s w...Weekly Updatesnis2
Shruti RajeshforZySec AIblog.zysec.ai·Oct 19, 2024The Rise of AI-Driven Cybersecurity Threats: Attack Vectors with a PunchlineWelcome, curious reader, to the thrilling world of AI-powered cyber threats—a place where algorithms make mischief, techies pull their hair in despair, and cybersecurity experts turn into digital detectives worthy of their own TV series. Let’s unrave...Weekly Updatesweekly update
Harshal Shahdelvingwithharshal.hashnode.dev·Oct 17, 2024Protecting Your Systems: A Guide to XML External Entity AttacksWhat is XML External Entity (XXE)? Before diving into XXE attacks, let’s first understand XML (Extensible Markup Language). XML is a markup language that structures and stores data in a format readable by both humans and machines. Originally develope...Fortify and Defend: Navigating the Cybersecurity Landscapexml external entity
Harshal Shahdelvingwithharshal.hashnode.dev·Oct 2, 2024Directory Traversal Attacks Explained: How to Detect and Stop ThemDirectory Traversal, also known as Path Traversal, is a serious web vulnerability that allows attackers to gain unauthorized access to the server’s filesystem by manipulating input paths. By exploiting this vulnerability, an attacker can access files...Fortify and Defend: Navigating the Cybersecurity Landscapebugbounty
Harshal Shahdelvingwithharshal.hashnode.dev·Sep 17, 2024LFI and RFI: A Deep Dive with Real-World ExamplesLFI (Local File Inclusion) and RFI (Remote File Inclusion) are two common web application vulnerabilities that allow attackers to include files on the server, potentially leading to unauthorized access, code execution, or data disclosure. LFI (Local ...76 readsFortify and Defend: Navigating the Cybersecurity Landscapecode security
Harshal Shahdelvingwithharshal.hashnode.dev·Aug 14, 2024SQL Injection: A Silent Threat to Your DatabaseSQL Injection is one of the most notorious vulnerabilities in web applications, allowing attackers to interfere with the queries an application makes to its database. Understanding how SQL injection works is crucial for developers and security profes...Fortify and Defend: Navigating the Cybersecurity Landscape#sqlinjection
Magda Jankowskamagdajankowska.hashnode.dev·Jun 25, 2024Your smart contract has a small vulnerabilities you can not see.// SPDX-License-Identifier: MIT pragma solidity ^0.8.13; contract SimpleStorage { string private storedValue; event ValueChanged(string newValue); // Function to set the value function setValue(string calldata newValue) external { ...Beginner Developers
RFSforAD Attacksad-attacks.hashnode.dev·May 21, 2023External Reconnaissance: Complete Methodology ExplainedExternal Reconnaissance – As technology continues to evolve, so do cyber threats, making cybersecurity an essential aspect of any modern organization. Ethical hacking, or hacking with a lawful and legitimate purpose, has become an integral part of en...Active Directory Enumerationcyber attack