Kamaldeep Singhthekamalsingh.hashnode.dev·Sep 18, 2023Cybersecurity Essentials for DevelopersCybersecurity is the practice of protecting systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. In today's digital world, cybersecurity is more important than ever before. Developers play a...Discuss#cybersecurity
Aishwarya Jagadishaishwarya21.hashnode.dev·Sep 17, 2023Unmasking the Unseen: How Machine Learning Uncovers Zero-Day VulnerabilitiesIn today's digital landscape, cybersecurity threats are constantly evolving, and one of the most concerning challenges for organizations is dealing with zero-day vulnerabilities. Zero-day vulnerabilities are software weaknesses exploited by cybercrim...Anusha Shanbhog and 2 others are discussing this3 people are discussing thisDiscuss·18 likes·57 readsMachine Learning
Foxpassfoxpassofficial.hashnode.dev·Sep 14, 2023Demystifying LDAP: The Key to Efficient Directory ServicesWhat is LDAP? LDAP, or Lightweight Directory Access Protocol, is a fundamental technology that plays a vital role in managing user accounts, resources, and directories within computer networks. How Does LDAP Work? LDAP follows a client-server model, ...DiscussFoxpass
Omkar Asgaonkaromkarasgaonkar.hashnode.dev·Aug 29, 2023CARTP - ReviewThe Certified Azure Red Team Professional (CARTP) by Altered Security is a beginner-friendly course for anyone who's looking to get started with Azure Security. The course lab simulates a multi-tenant environment that covers multiple kill chains (Att...DiscussReviewsAzure
Dwayne McDanielforGitGuardiangitguardian.hashnode.dev·Aug 2, 2023Secure Code Review Best Practices [cheat sheet included]By C.J. May Code review is an important part of the development process that can help to identify issues with the quality of the software. Secure code reviews are a specific type of code review that is specifically evaluating the security of the soft...Discusscode review
topon singwwvw.hashnode.dev·Aug 1, 2023Demystifying Spooling in Cyber Security: A Comprehensive GuideWelcome to our comprehensive guide on demystifying spooling in cyber security! In today's digital age, where threats and vulnerabilities lurk around every corner of the internet, it is crucial to stay one step ahead in safeguarding sensitive informat...Discusscyber security
Derek Onwudiwetecheffect.hashnode.dev·Jul 18, 2023The Enigmatic Friend RequestIn the digital Village of Ukana ; Laura was a social media-savvy individual, connecting with friends and family across various platforms. One ordinary day, as she browsed through her notifications, she stumbled upon an intriguing friend request on he...DiscussRequests
LeafyforLeafy's CyberSec Journal leafyoffensivesec.hashnode.dev·Jul 11, 2023Initiating a Cybersecurity Odyssey: Navigating the Digital Realm Safely and Securely"The price of cybersecurity is eternal vigilance." Before I start with the main technical talk let me first tell you a bit about what this series is going to contain. Here I will mostly talk about the knowledge and insights I have managed to acquire ...Discuss·1 like#cybersecurity
Deva Saidevasai.hashnode.dev·Jul 4, 2023What is Packet-filtering Firewalls ?Packet-filtering firewalls are a type of cybersecurity technology used to enforce network security policies by inspecting and filtering individual network packets based on predefined rules. These firewalls operate at the network layer (Layer 3) or tr...Discuss CISSP course
Mark Ivashinkomarkcybersec.com·Jun 21, 2023Scripting Pings/Nmap scanningNetwork scanning and port discovery can be crucial in the initial phases of information gathering for security testing. Recently I came across an interesting approach within a TCM security course about writing out scripts for pings. I decided to giv...Discuss·37 readscyber security