Christopher Coffeecmcoffeedev.hashnode.dev·17 hours agoMonitor Android’s filesystem with fsmon to detect insecure storageI’m diving deeper into security and wanted to document my process along the way. First I am going over the process of monitoring an Android device’s filesystem. Download Android Studio or Android command line tools You have two options to get the And...Discuss#cybersecurity
ismail Ginfinitecloud.hashnode.dev·Sep 28, 2023Harnessing a Hacker's Mindset: DevSecOps ImperativeIn our digital epoch, where tech-driven advancements surge daily, merely deploying software isn't enough; ensuring its security is paramount. The transformation brought about by DevOps is commendable, but the "Sec" in devSecOps deserves equivalent at...Discuss·40 likesDevops
FOLASAYO SAMUEL OLAYEMIsaintvandora.hashnode.dev·Sep 28, 2023Introduction to Ethical Hacking for Software EngineersIn a world increasingly dependent on technology, the importance of safeguarding sensitive data and digital assets has never been greater. As the digital landscape evolves, so do the threats that lurk in the shadows. Cyberattacks can have devastating ...Discuss#cybersecurity
Derek Onwudiwetecheffect.hashnode.dev·Sep 28, 2023Resist Social Engineering AttacksSocial engineering attacks are manipulative tactics used by hackers to deceive individuals or organizations into divulging sensitive information, performing actions, or compromising security. Here are common tactics and tips to recognize and resist t...Discusssocial media
Green Methodgreenmethod.hashnode.dev·Sep 28, 2023The Role of Endpoint Detection and Response (EDR) in Today’s Cybersecurity WorldIn today’s digital landscape, organizations face an ever-evolving array of cyber threats that can compromise their data, systems, and reputation. Antivirus software and traditional endpoint security tools, while important, are no longer sufficient to...Discussendpoint security
Dhananjay kulkarnidhananjaykulkarni.hashnode.dev·Sep 28, 2023Python Data StructuresIn the previous installments of our "Python for Scripting" series, we explored Python's basics, including variables, data types, operators, and conditional statements. Now, it's time to delve deeper into Python's powerful data structures. In Part 3, ...Discuss·1 likePython For Scriptingdatastructure
Sameer Dasakacyberinsights.hashnode.dev·Sep 27, 2023Newly Discovered "Solar" and "Mango" Backdoors Employed in Two Distinct APT34 OperationsExecutive Summary ESET's findings reveal two distinct OilRig campaigns, "Outer Space" in 2021 and "Juicy Mix" in 2022, both exclusively targeting Israeli organizations. In both campaigns, the attackers compromised legitimate Israeli websites for the...DiscussBackdoor
Derek Onwudiwetecheffect.hashnode.dev·Sep 27, 2023Digital Privacy and SurveillancePrivacy in the Digital Age is a multifaceted issue with far-reaching implications. Here are some of the broader implications of digital privacy and surveillance, along with examples: Loss of Personal Privacy: Example: Social media platforms often col...Discussprivacy
Panagiotis Vasilikossecuringbits.com·Sep 27, 2023Finding Credentials in A Dev's MachineDiscovering credentials on a developer's machine is like stumbling upon a goldmine 🧈. Here are eight crucial locations on a Unix-type machine where credentials can be found 👇.Discuss#cybersecurity
Derek Onwudiwetecheffect.hashnode.dev·Sep 26, 2023Safe file sharing practiceSome safe practices for sharing files online without compromising security: Use Secure Channels: Always share sensitive files through secure and encrypted channels. Email attachments may not be the safest option; consider using secure file-sharing se...Discuss#cybersecurity