Ben-Hur Santos OttforGuia de AppSec :: Blogblog.guiadeappsec.com.br·15 hours agoAppSec Newsletter 0037E chegamos a mais uma edição da nossa newsletter! Vídeo Novo no canal Guia de AppSec https://www.youtube.com/watch?v=-lLgMupOqIw Links 🎖️ Google | If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development ...Discuss·33 readsappsec
Sharon Jebitokjebitok.hashnode.dev·18 hours agoCommand Line: Linux Shell (TryHackMe)In this article, I will write a write-up for the Linux Shell that covers Interacting With a Shell, Types of Linux Shells, Shell Scripting and Components, The Locker Script and a Practical Exercise at the end. Who is the facilitator between the user ...DiscussLinux
Sharon Jebitokjebitok.hashnode.dev·18 hours agoWindows PowerShellIn this article, I will write a write-up for the Windows PowerShell that covers What Powershell is, Powershell Basics, Navigating the File System and Working with Files, Piping, Filtering and Sorting Data, System and Network information, Real-time Sy...DiscussPowershell
Abdulkader Alrezejipv6spot.hashnode.dev·a day agoCaptive Portal IPv6 SupportProject link on GitHub: https://github.com/abdulkader-alrezej/ipv6spot IPv6Spot a pioneering captive portal system designed exclusively for IPv6 networks. Developed by Abdulkader Alrezej, IPv6Spot addresses the critical need for effective network acc...Discussnetworking
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·a day agoHow to Build Your Own Private Hacking Lab with VirtualBoxEthical hacking involves testing and finding vulnerabilities in systems. But doing this on live networks or public servers can lead to accidental damage. Setting up a virtual lab for hacking is a great way to sharpen your skills in a safe environment...Discuss#cybersecurity
javed inamdarjavedtelsource.hashnode.dev·Oct 24, 2024Enhancing Security with Microsoft 365: Data Protection FeaturesIn today's rapidly evolving digital landscape, protecting sensitive data is paramount. Businesses are increasingly adopting cloud-based solutions to enhance collaboration and streamline operations, but this also introduces new risks related to data s...DiscussMicrosoft
b1d0wsb1d0ws.hashnode.dev·Oct 23, 2024AppSec Project - Chapter 1, Manually fixing vulnerabilitiesIntroduction Hello, welcome to the b1d0ws appsec project! The idea here is to introduce you, with a few articles, to a process of building, fixing vulnerabilities and integrating a python website with application security. I'm a beginner in this proc...Discuss·103 readsPostsappsec
Aboelhamd Abdellatifaboelhmd.com·Oct 23, 2024An In-Depth Look at the Verizon 2024 Data Breach Investigations ReportThe 2024 Data Breach Investigations Report (DBIR) by Verizon is a crucial document that outlines the latest trends and patterns in cybersecurity breaches. As organizations increasingly rely on digital infrastructures, understanding the landscape of c...DiscussCybersecurity Strategies
Cyber Vipercyberviperdefense.hashnode.dev·Oct 22, 2024Deploying Security Onion inside of an NSX SegmentThere are various ways to deploy Security Onion within vSphere, but in this particular case, I was working inside an NSX segment. I couldn’t personally find any examples of this being done before, although I’m almost certain there are. That said, I’v...Discuss#cybersecurity
JKARjonans-blog.hashnode.dev·Oct 22, 2024Understanding Cryptography: The Backbone of Modern Encryption and DecryptionIn today’s digital world, where data breaches and cyber threats are ever-evolving, cryptography plays a crucial role in protecting sensitive information. Whether you're securing your online banking, ensuring the privacy of your emails, or safeguardin...Discuss·2 likes#cybersecurity