Chris Holcombenullvoid.hashnode.dev·Dec 9, 2024How to Set Up Metasploitable on a Virtual Machine: Build Your Own Cybersecurity LabCreating a home cybersecurity lab is a critical step for anyone exploring ethical hacking, penetration testing, or security research. In this tutorial, we’ll walk through setting up Metasploitable on VirtualBox, from downloading the virtual disk imag...#Cybersecurity Lab
Niranjan Gblog.securityinsights.io·Aug 4, 2024Managing CVE Data Locally with CVE Database ManagerIntroduction In the cybersecurity landscape, keeping track of vulnerabilities is crucial for maintaining secure systems. The Common Vulnerabilities and Exposures (CVE) list is a comprehensive catalog of such vulnerabilities. However, using public API...1 like·124 readsCVE Database
Nikhil Pandeynikhilpandeydigital.hashnode.dev·Mar 15, 2024Decoding Security Debt: Differentiating It from Tech Debt and Ways to Tackle ItIn the fast-paced world of technological advancements, organizations often face the dilemma of balancing innovation with security. Tech debt and security debt are two terms commonly used in the realm of software development and cybersecurity. Underst...10 likesSecurity debt
Dwayne McDanielforGitGuardiangitguardian.hashnode.dev·Jan 2, 2024Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian PlatformAnyone who has tried to deal with secrets sprawl at scale will tell you it feels like a daunting task. On the surface, at first glance, it can seem like it's just a simple matter of some grep and rotating a few keys. Admittedly, if you are a solo dev...Security