Jithu Josephjithu-joseph.hashnode.dev·Dec 17, 2024Protecting Your Passwords: Simple Steps for a Safer Digital LifeImagine this: you wake up one morning, grab your phone, and see dozens of notifications about unusual activity on your accounts. Panic sets in as you realize someone has gained access to your personal information. Scenarios like this happen more ofte...passwords
J3bitokjebitok.hashnode.dev·Nov 10, 2024Cyber Defense Frameworks: Cyber Kill Chain (TryHackMe)In this article, I will write a Cyber Kill Chain write-up: The Basics that covers Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control (C&C), Action on Objectives (Exfiltration), and Practice Analysis. What is the n...cyber-defense
raja manisynackwithraj.hashnode.dev·Sep 22, 2024Container Tech Evolution - Learn like a baby with baby stepswhat is containers? OLDEN DAYS Application runs the business; no app, no business. Early 90s to mid-2000s → One app for every server Inefficient Resource Utilization: Servers were often underutilized, leading to wasted hardware resources like CPU, ...ContainerDocker
Harshal Shahdelvingwithharshal.hashnode.dev·Jul 18, 2024Introduction to MITRE ATT&CK: A Starter GuideIn today's digital world, cyberattacks are a constant threat. They can target individuals, businesses, and even critical infrastructure. As cyberattacks evolve and become more sophisticated, security professionals need powerful tools to combat them. ...1 likeFortify and Defend: Navigating the Cybersecurity Landscapecyber-defense