Jithu Josephjithu-joseph.hashnode.dev·Nov 15, 2024Cyber Resilience: More Than Just CybersecurityWhat is Cyber Resilience? Cyber resilience is the ability of an organization to adapt, prepare, respond, and recover from cyber threats, enabling it to continue critical operations despite disruptions. What Types of Threats Does Cyber Resilience Addr...Discuss·33 likes·115 readsAI
Mbaoma chukwuemekaforMy cybersecurity journeymbaoma.hashnode.dev·2 hours agoCybersecurity Awareness Month Day 6:The Evolution of Cyber Threats Introduction Cyber threats have evolved dramatically over the years. From simple pranks and experimental viruses to sophisticated ransomware and nation-state-sponsored cyberattacks, the nature of these threats has grown...Discuss·10 likes#cybersecurity
Mbaoma chukwuemekaforMy cybersecurity journeymbaoma.hashnode.dev·Nov 20, 2024Cybersecurity Awareness Month Day 5: Case Studies And Real Life Examples of Attacks and Their ConsequencesCyberattacks are not just abstract threats they are real, costly, and can have far reaching consequences. To highlight the importance of cybersecurity, let us examine some notable real world cases and the lessons they offer. 1. WannaCry Ransomware At...Discuss·20 likes#cybersecurity
Madhav Ganesanmadhavganesan.hashnode.dev·20 hours agoIntroduction to CybersecurityIt is a practice of protecting programs, networks, computer systems, and their components from unauthorized digital access and attacks. CIA Triad Confidentiality It ensures that information is only accessible to those who are authorized to view it. I...Discuss#cybersecurity
ze coutoprotocol-udp.hashnode.dev·Nov 20, 2024Incident Response PlanThis document outlines an Incident Response Plan (IRP) tailored for a cyberattack scenario, emphasizing response and prevention strategies: Incident Response Plan (IRP): Cyberattack Scenario LegalShield Partners Date: 12.12.2012Version: 1.0Prepared ...DiscussIRP
Anastasia Zaharievawhenmathmetdata.hashnode.dev·Nov 20, 2024Python Use CasesToday, we're taking a side quest away from the 30-day challenge because I found it interesting to learn even more about Python, and I wanted to share it here. Python is one of the most versatile programming languages and is used across a wide range o...DiscussPython
Sprasad Pujarisprasad.hashnode.dev·Nov 20, 2024DNS Lookup Mastery: A Comprehensive Guide to Network Exploration 🌐🔍Introduction DNS (Domain Name System) lookup is a fundamental networking technique that helps translate human-readable domain names into IP addresses. This guide will walk you through various DNS lookup techniques using the powerful nslookup command!...Discussdns
Mbaoma chukwuemekaforMy cybersecurity journeymbaoma.hashnode.dev·Nov 19, 2024Cybersecurity Awareness Month: Day 4Overview of Cyber Attacks (Highlight common attacks like DDoS, brute force, etc.) Welcome to Day 4 of Cybersecurity Awareness Month. Today, we’re diving into cyber attacks, examples, and prevention. Cyber attacks are deliberate attempts by malicious ...Discuss·20 likes#cybersecurity
Arnab Kabasiwriter93.hashnode.dev·Nov 19, 2024Ethical Hacking for IoT Devices: Protecting the Internet of Things from ExploitationThe Internet of Things (IoT) has revolutionized the way we live, work, and interact with technology. From smart thermostats to wearable fitness trackers and connected home security systems, IoT devices are embedded in nearly every aspect of modern li...Discussethicalhacking
Pentest_Testing_CorpforVulnerabilities in Laravelsql-injection-prevention-in-laravel.hashnode.dev·Nov 19, 2024Prevent XSS Attacks in Laravel: Best Practices & ExamplesCross-Site Scripting (XSS) is one of the most prevalent vulnerabilities affecting web applications. Attackers inject malicious scripts into your website, compromising the user experience and potentially stealing sensitive data. As Laravel developers,...Discuss#cybersecurity
FIKARA BILALblog.fikara.io·Nov 19, 2024Collecte d'informations Bug BountyDans un contexte de BugBounty ou de test de sécurité, la collecte d’informations est une étape qui consiste à recueillir un maximun de données sur une cible. Le but est de mieux comprendre son environnement et surtout identifier des vulnérabilités po...Discuss·1 likebugbountysearchengine