Arnab Dasdasarnab.hashnode.dev·Apr 18, 2024Comprehensive Guide to Web Security Best Practices: Preventing Common AttacksIntroduction In today's interconnected digital landscape, web security stands as a paramount concern for businesses, organizations, and individuals alike. The ever-evolving nature of cyber threats presents a constant challenge, making it imperative t...Discuss·10 likes#cybersecurity
The WatcherProthewatcher.xyz·Mar 27, 2024Attack: Password SprayingA password spraying attack is a type of cyber attack where an attacker uses a single password (or a list of commonly used passwords) against many different accounts before moving on to try a different password. This method is employed to avoid accoun...DiscussAttackscyberattack
The WatcherProthewatcher.xyz·Mar 26, 2024How to protect your APIs?The substantial volume of data transmitted via APIs is a matter of concern for those invested in cybersecurity. Despite proactive measures to implement early-stage security considerations and solidify software development life cycle (SDLC) protocols,...Discusscyberattack
Nehal IngoleforRead & Learnlearnwithnehal.hashnode.dev·Mar 18, 2024Cyber Security And Confusion MatrixHello Everyone In this article we will discuss what role does Confusion Matrix plays in the Cybersecurity field?? As we all know that cybersecurity is very important as they are responsible for our security from cybercrime and the tools and tech they...DiscussFalseNegative
Adrianajcyb3r.com·Mar 10, 2024The Power of Influence and Manipulation: Decoding Social EngineeringIn today's world, cyber-attacks are becoming increasingly sophisticated, posing significant challenges in combating cybercriminals. Virtually every imaginable device is interconnected via the Internet, enveloping us in the cyber realm. Cybercriminals...Discuss#cybersecurity
The WatcherProthewatcher.xyz·Feb 24, 2024Attack: SlowlorisThe Slowloris DDoS attack has emerged as a silent yet formidable challenge for businesses. This sophisticated form of cyber assault, unlike its more blatant counterparts, operates under the radar, exploiting the very mechanics that keep web servers r...DiscussAttackscyberattack
The WatcherProthewatcher.xyz·Feb 23, 2024Attack: SQL InjectionSQL Injection is a type of cybersecurity vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It usually involves inserting or "injecting" malicious SQL code into a query that's supposed to re...DiscussAttackscyberattack
The WatcherProthewatcher.xyz·Feb 23, 2024Attack: Cross-Site Scripting (XSS)Cross-site scripting (XSS) is a type of security vulnerability that affects web applications. It allows attackers to inject malicious scripts into content that appears to be from a trusted source. When this content is viewed by an unsuspecting user, ...DiscussAttackscyberattack
Aljoscha Irmeraljoschairmer.hashnode.dev·Jan 16, 2024Deciphering the Hidden: The Role of AI in Unmasking Obfuscated MalwareIntroduction In the evolving landscape of cybersecurity, the threat of malware and viruses persists as a significant challenge. These malicious entities often employ obfuscated code - a method designed to mask their true purpose and make analysis dif...Discuss·36 readsObfuscated Code
AfriMonin4fr1m0n1n.hashnode.dev·Jan 1, 2024How i found a Vulnerable Russian Mission Control Part 1Welcome back Hackers! In this post i will show you, how i found a vulnerable Russian Mission Control. We're going to work with https://www.shodan.io/ so make sure you create an account, its free. Lets get started! Searching I was searching for Russia...Discuss·42 readsHacking Russian systemshacking