FIKARA BILALblog.fikara.io·Nov 19, 2024Collecte d'informations Bug BountyDans un contexte de BugBounty ou de test de sécurité, la collecte d’informations est une étape qui consiste à recueillir un maximun de données sur une cible. Le but est de mieux comprendre son environnement et surtout identifier des vulnérabilités po...Discuss·1 like·31 readsbugbountysearchengine
Nysa Guptanysaa.hashnode.dev·Nov 1, 2024Cryptography: The Secret Code Behind Your ScreensEver wonder how your data stays private when you’re shopping online, sending a message, or logging into a bank account? Cryptography is the art (and science) that makes sure all that sensitive information remains hidden from prying eyes. Imagine it l...Discuss·1 likecybersecurity
Yuva Shankar Narayana Dhaipullayysnwrites.hashnode.dev·Oct 31, 2024Modern Cybersecurity Threatswhat is the role of cybersecurity in this world ! As the internet is growing and it is more accessible to people , people use internet for both good and bad. As a coin has two sides internet has two sides too , where these bad guys pursue malpractice...Discuss·11 likescybersecurity
Shruti RajeshforZySec AIblog.zysec.ai·Oct 25, 2024Global AI Regulatory Sandbox Initiatives: The UK and Singapore’s AI Petri Dishes!Ahoy, tech tinkerers and digital dreamers! If you’ve ever wondered what happens when you mix AI with a dash of finance and a sprinkle of healthcare, look no further. The UK and Singapore have set up their very own regulatory sandboxes—think of them a...DiscussAI Regulationscyberattack
Shruti RajeshforZySec AIblog.zysec.ai·Oct 25, 2024Germany’s Data Sovereignty Rules: The Oktoberfest of AI Compliance!Hallo, data devotees and cloud connoisseurs! As October 2024 rolls on, Germany’s new data sovereignty rules for AI are unspooling like the plot of a Bavarian opera—filled with drama, intrigue, and just the right amount of digital oom-pah-pah. Let’s u...DiscussAI Regulationsoktoberfest of AI
Victor Uzoagbacyberfriend.hashnode.dev·Oct 23, 2024Zero Trust Architecture: Advantages and Challenges in ImplementationIntroduction As changes are taking place regarding the digital platform, conventional security models cannot cope with the threats that prevail today. Perimeter-based security relies primarily on the proposition that threats from outside an organizat...Discusssecurityawareness
Victor Uzoagbacyberfriend.hashnode.dev·Oct 22, 2024Quantum Computing's Impact on Current Encryption MethodsIntroduction Quantum computing is a wonder of modern times, still in the embryonic stage of development and assurance of computation speed unparalleled by classical computers. While this may open new avenues, it is also one of the most dangerous tech...Discussencryption
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Oct 17, 2024Protecting Your Systems: A Guide to XML External Entity AttacksWhat is XML External Entity (XXE)? Before diving into XXE attacks, let’s first understand XML (Extensible Markup Language). XML is a markup language that structures and stores data in a format readable by both humans and machines. Originally develope...DiscussFortify and Defend: Navigating the Cybersecurity Landscapexml external entity
Indu Jawlacoders.hashnode.dev·Oct 14, 2024In-Depth Exploration of Cybersecurity ConceptsThe CIA Triad: Confidentiality, Integrity, Availability 1. Confidentiality Definition: Confidentiality ensures that sensitive information is accessible only to those authorized to have access. It is fundamental in preventing unauthorized disclosure o...Discuss#cybersecurity
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Oct 9, 2024Comprehensive Guide to Brute Force Attacks: Examples, Detection, and Prevention TacticsIn the realm of cybersecurity, Brute Force Attacks stand as one of the most fundamental and common threats. Despite their simplicity, they can be incredibly dangerous if left unchecked. This blog explores what a brute force attack is, presents a real...DiscussFortify and Defend: Navigating the Cybersecurity Landscapebruteforcing