FIKARA BILALblog.fikara.io·9 hours agoWazuh Intégration VirusTotalPré-requis: Installation de Wazuh Déploiement d'un agent wazuh sur une machine Configuration des alertes (FIM et Brute Force Attack) Wazuh est en mesure de renforcer les détections, avec une intégration VirusTotal, qui génère des alertes sur les...DiscussVirustotal
ARJUN Marjunmuthukumar.hashnode.dev·a day agoBuilding a Solid Foundation in Cybersecurity: Core Techniques - Part 1In today’s increasingly digital world, cybersecurity is a critical discipline. From the growing threats of data breaches to the need for secure systems, organizations require individuals well-versed in a wide range of cybersecurity areas. Below, we'l...Discuss·12 likes·49 readscybersecurity
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Sep 5, 2024Insecure Direct Object Reference (IDOR) Attacks Explained: Comprehensive GuideInsecure Direct Object Reference (IDOR) is a common web application security flaw that occurs when an application exposes references to internal objects like files, database entries, or user records, which should not be accessible by unauthorized use...DiscussFortify and Defend: Navigating the Cybersecurity Landscape#cybersecurity
TATHAGATA ROYthreatradar.vercel.app·Aug 29, 2024Mastering SELinux: A Comprehensive Guide to Enhancing Linux Security with Mandatory Access Control1. Introduction to SELinux Overview of SELinux:Security-Enhanced Linux (SELinux) is an advanced access control mechanism integrated into the Linux kernel. It provides an additional layer of security by enforcing mandatory access control (MAC) policie...DiscussLinux
FIKARA BILALblog.fikara.io·Aug 29, 2024Wazuh: InstallationWazuh est une plateforme open-source qui offre des moyens de détecter des menaces, de répondre aux incidents, de surveiller l'intégrité des fichiers et de fournir une visibilité sur l'ensemble de l'infrastructure. Wazuh est essentiellement un SIEM, u...Discuss·80 readsSecurity
FIKARA BILALblog.fikara.io·Aug 27, 2024Password Security: Best Practices and ManagementProtecting your online information is crucial to avoid disastrous consequences. No one is immune to identity theft, loss or leakage of personal or financial data, or unauthorized access. One way to reduce the risk is to ensure a certain level of pass...DiscussSecurity
FIKARA BILALblog.fikara.io·Aug 27, 2024La Sécurité des Mots de Passe : Bonnes Pratiques et GestionProtéger ses informations en ligne est crucial pour éviter des conséquences désastreuses. Personne n'est à l'abri d'un vol d'identité, d'une perte ou fuite de données personnelles ou financières, ou encore d'accès non autorisé. Un moyen de diminuer l...Discuss·36 readsSecurity
Dimple Menghanidimplemenghani.hashnode.dev·Aug 25, 2024Understanding Zero TrustEmbracing Zero Trust: A Modern Approach to Securing Your Organization In today’s digital world, where cyber threats are evolving, safeguarding your organization requires more than traditional defenses. With remote work, personal devices, and increasi...Discuss·26 readsAzure
sudip adhikarisudip007.hashnode.dev·Aug 23, 2024Cyber AttackWhat is Cyber Attack ? A cyber attack is any intentional effort by hackers to steal, expose, alter, disable, or destroy data, applications, or other assets by gaining unauthorized access to computer systems, networks, or digital devices. Imagine your...Discuss#cybersecurity
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Aug 14, 2024SQL Injection: A Silent Threat to Your DatabaseSQL Injection is one of the most notorious vulnerabilities in web applications, allowing attackers to interfere with the queries an application makes to its database. Understanding how SQL injection works is crucial for developers and security profes...DiscussFortify and Defend: Navigating the Cybersecurity Landscape#sqlinjection