ALESSANDROadaptive.io·Jul 25, 2024Cyber Security WorkflowLorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Praesent elementum facilisis leo vel fringilla est ullamcorper eget. At imperdiet dui accumsan sit amet nulla facilities morbi...Discusscyber security
Morgan Bin Bashmorganbinbash.hashnode.dev·Jul 24, 2024Advanced SQLI TechniquesWARNING: If you don't know what you are doing, please refrain from using these techniques. Improper use may harm the database. Advanced Payloads and Techniques Error-Based SQL Injection Advanced Error Payloads: ' AND (SELECT 1 FROM (SELECT COUNT(*...Discusscyber security
neharika .chaostude.hashnode.dev·Jul 21, 2024Digital Forensics: Unveiling the Invisible EvidenceIn today's world of increasing digitalization, crimes are not restricted to specific physical regions. Digital forensics expertise is currently necessary because of the rise in cybercrimes, data breaches, and digital fraud. Digital forensics is the p...Discusscyber security
Ghassan Amaimiaghassanamaimia.hashnode.dev·Jul 9, 2024OSCP Journey - TJ_Null Escape :I - Introduction : In this blog post, we will explore a comprehensive penetration test conducted on the target machine (Escape from HachTheBox) . The objective of this assessment is to identify potential vulnerabilities, exploit them, and ultimately ...Discusscyber security
Salik Seraj Naikcodewithssn.hashnode.dev·Jul 9, 2024CISSP Security Domains𝗨𝗻𝗱𝗲𝗿𝘀𝘁𝗮𝗻𝗱𝗶𝗻𝗴 𝘁𝗵𝗲 𝟴 𝗧𝘆𝗽𝗲𝘀 𝗼𝗳 𝗖𝗜𝗦𝗦𝗣 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗗𝗼𝗺𝗮𝗶𝗻𝘀 In the realm of cybersecurity, the Certified Information Systems Security Professional (CISSP) certification stands out as a mark of excellence and expert...DiscussCyber Security Domians
Sharanjit Singhsharanjitmalhi.hashnode.dev·Jul 7, 2024How APIs are making it easy to hack systems: An In-Depth LookIn today's interconnected digital landscape, Application Programming Interfaces (APIs) are the linchpin that allows different software systems to communicate and share data seamlessly. APIs are essential for building modern applications, enabling int...Discuss·43 readsAPIs
Salik Seraj Naikcodewithssn.hashnode.dev·Jul 4, 2024Top 10 Bugs For Bug Hunters𝗧𝗼𝗽 𝟭𝟬 𝗕𝘂𝗴𝘀 𝗳𝗼𝗿 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗛𝘂𝗻𝘁𝗲𝗿𝘀 🔹1. SQL Injection (SQLi) ▪️Description: Exploiting web applications by injecting malicious SQL code. ▪️Impact: Unauthorized access to databases, data leakage. 🔹2. Cross-Site Scripting (...Discussbugbounty
Networsys Technologiesnetworsys.hashnode.dev·Jul 1, 2024Cybersecurity for Small Businesses: 10 Essential Steps to Get StartedIn today’s digital age, cybersecurity is not just a concern for large corporations or tech giants. Small businesses increasingly become targets of cyber threats due to their valuable data and often less robust security measures. Whether you run a loc...DiscussCyber Security Training
aisha javedcyberurdu.hashnode.dev·Jun 24, 2024Daily Reading Challenge CourseIntroduction to the 30-Day Cyber Security Reading Challenge Course Daily Reading Challenge Course اس آرٹیکل میں، ہم آپ کو سائبر سیکیورٹی کا سب سے اہم تصور شیئر کریں گے۔ سائبر پشتو 30 روزہ سائبر سیکیورٹی ریڈنگ چیلنج کورس مفت میں پیش کرتا ہے! یہ چیلن...Discussdaily reading
Cybercrimeswatchcyberwatch.hashnode.dev·Jun 23, 2024Cryptojacking, The Silent Thief in the World of Cyber CrimesIn the realm of cyber-crimes, where threats evolve rapidly and innovation is the norm, a stealthy villain has emerged – cryptojacking. As the digital landscape expands and cryptocurrency gains momentum, cyber criminals have found a lucrative avenue f...Discusscyber crimes