Shruti RajeshforZySec AIblog.zysec.ai·Oct 19, 2024October 2024 Cybersecurity Legislation: The Legal Plot Thickens!Welcome, dear readers, to the latest episode of “As the Legislation Turns,” where we explore the dramatic twists in cybersecurity laws with the flair of a courtroom drama and just a hint of legal comedy. Grab your gavels and popcorn, because here’s w...DiscussWeekly Updatesnis2
Shruti RajeshforZySec AIblog.zysec.ai·Oct 19, 2024The Rise of AI-Driven Cybersecurity Threats: Attack Vectors with a PunchlineWelcome, curious reader, to the thrilling world of AI-powered cyber threats—a place where algorithms make mischief, techies pull their hair in despair, and cybersecurity experts turn into digital detectives worthy of their own TV series. Let’s unrave...DiscussWeekly Updatesweekly update
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Oct 17, 2024Protecting Your Systems: A Guide to XML External Entity AttacksWhat is XML External Entity (XXE)? Before diving into XXE attacks, let’s first understand XML (Extensible Markup Language). XML is a markup language that structures and stores data in a format readable by both humans and machines. Originally develope...DiscussFortify and Defend: Navigating the Cybersecurity Landscapexml external entity
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Oct 2, 2024Directory Traversal Attacks Explained: How to Detect and Stop ThemDirectory Traversal, also known as Path Traversal, is a serious web vulnerability that allows attackers to gain unauthorized access to the server’s filesystem by manipulating input paths. By exploiting this vulnerability, an attacker can access files...DiscussFortify and Defend: Navigating the Cybersecurity Landscapebugbounty
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Sep 17, 2024LFI and RFI: A Deep Dive with Real-World ExamplesLFI (Local File Inclusion) and RFI (Remote File Inclusion) are two common web application vulnerabilities that allow attackers to include files on the server, potentially leading to unauthorized access, code execution, or data disclosure. LFI (Local ...Discuss·75 readsFortify and Defend: Navigating the Cybersecurity Landscapecode security
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Aug 14, 2024SQL Injection: A Silent Threat to Your DatabaseSQL Injection is one of the most notorious vulnerabilities in web applications, allowing attackers to interfere with the queries an application makes to its database. Understanding how SQL injection works is crucial for developers and security profes...DiscussFortify and Defend: Navigating the Cybersecurity Landscape#sqlinjection
Magda Jankowskamagdajankowska.hashnode.dev·Jun 25, 2024Your smart contract has a small vulnerabilities you can not see.// SPDX-License-Identifier: MIT pragma solidity ^0.8.13; contract SimpleStorage { string private storedValue; event ValueChanged(string newValue); // Function to set the value function setValue(string calldata newValue) external { ...DiscussBeginner Developers
RFSforAD Attacksad-attacks.hashnode.dev·May 21, 2023External Reconnaissance: Complete Methodology ExplainedExternal Reconnaissance – As technology continues to evolve, so do cyber threats, making cybersecurity an essential aspect of any modern organization. Ethical hacking, or hacking with a lawful and legitimate purpose, has become an integral part of en...DiscussActive Directory Enumerationcyber attack
Akhere Sonny-Egbeahieakhere.hashnode.dev·Dec 17, 2022Hunting Unsigned DLLs Using KQLUnsigned DLLs, or dynamic-link libraries, are executable files that contain code that can be used by multiple programs on a Windows system. While DLLs can be a useful and efficient way to share code between applications, they can also be a security r...Discuss·927 readsKQL
Hasan MahmudforCyber Aeronautycs Ltd. Blogblog.cyberaeronautycs.com·Oct 2, 2022Paying ransomware demands has legal ramifications: Ransomware's Changing StateThe legal ramifications of paying or refusing to pay ransomware demands loom over organizations like a specter as assaults become more common and sophisticated. According to the Acronis Cyberthreats Report 2022, ransomware remains the #1 threat to SM...Discusscyber attack