J3bitokjebitok.hashnode.dev·Nov 10, 2024Cyber Defense Frameworks: Cyber Kill Chain (TryHackMe)In this article, I will write a Cyber Kill Chain write-up: The Basics that covers Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control (C&C), Action on Objectives (Exfiltration), and Practice Analysis. What is the n...Discusscyber-defense
raja manisynackwithraj.hashnode.dev·Sep 22, 2024Container Tech Evolution - Learn like a baby with baby stepswhat is containers? OLDEN DAYS Application runs the business; no app, no business. Early 90s to mid-2000s → One app for every server Inefficient Resource Utilization: Servers were often underutilized, leading to wasted hardware resources like CPU, ...DiscussContainerDocker
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Jul 18, 2024Introduction to MITRE ATT&CK: A Starter GuideIn today's digital world, cyberattacks are a constant threat. They can target individuals, businesses, and even critical infrastructure. As cyberattacks evolve and become more sophisticated, security professionals need powerful tools to combat them. ...Discuss·1 likeFortify and Defend: Navigating the Cybersecurity Landscapecyber-defense