Jiyajiyajha.hashnode.dev·4 hours agoFortifying Our Foundations: Charting the Path in Critical Infrastructure ProtectionThe process of preventing, reducing, or fixing the risks of vulnerabilities in critical infrastructure assets is known as critical infrastructure protection or CIP.Critical infrastructure is shielded by CIP from terrorist threats, natural disasters, ...Discuss #CriticalInfrastructureProtection
Andreas RenzforEncryptoriumblog.encryptorium.com·5 hours agoThe Heartbleed Vulnerability: CVE-2014-0160The Heartbleed bug is one of the most significant security vulnerabilities that have impacted the internet, affecting millions of web servers and users' data security worldwide. Discovered in April 2014, Heartbleed was a severe flaw in OpenSSL, a wid...Discussheartbleed
Gaurav Chaudharypixelgig.pro·16 hours agoLevel Up Your Code and Your Security: Day 2 - Common Cyber Threats: The Enemies We FaceWelcome back, fellow code warriors! Yesterday, we embarked on a journey to become cybersecurity champions alongside our programming prowess. Today, we delve deeper into the enemy lines – the ever-evolving landscape of cyber threats. Understanding the...DiscussCybersecurity Bootcamp: My Daily Grind to Expertise#cybersecurity
Ayushri Jainayushrijain.hashnode.dev·Mar 26, 2024Adversarial Machine Learning in Image Classification: A Survey Toward the Defender’s PerspectiveThis paper is a survey of defender's techniques describing adversarial machine learning in image classification. This blog is originally written for CSCE 689:601 and is the 16th blog of the series: "Machine Learning-Based CyberDefenses". Takeaways T...Discuss#cybersecurity
Gaurav Chaudharypixelgig.pro·Mar 26, 2024Level Up Your Code and Your Security: Day 1 - Demystifying Cybersecurity👨💻❤Hey everyone! Welcome to day one of my quest to become a cybersecurity pro, and more importantly, to help you become one too! As programmers, we wield immense power to create incredible things. But with great power comes great responsibility, especia...DiscussCybersecurity Bootcamp: My Daily Grind to Expertise#cybersecurity
Tarun Saitarunsai.hashnode.dev·Mar 25, 2024Master Linux Terminal - Password, I/O and Shell CustomizationWelcome to the world of Linux! Whether you're delving into the command line for the first time or looking to enhance your skills, grasping basic commands and customizing your shell environment is crucial. Let's embark on this journey together and exp...DiscussLinux
SANKALP HARITASHsankalp-haritash.hashnode.dev·Mar 25, 2024Securing the Digital Realm: A Dive into Encryption Algorithms and the Magic of SSL/TLSIn the vast expanse of the digital universe, data security emerges as a paramount concern, akin to safeguarding treasures in the ancient world. Encryption, the art of encoding messages, stands as the guardian of this realm, ensuring that prying eyes ...Discussencryption
Ayushri Jainayushrijain.hashnode.dev·Mar 24, 2024EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware DetectionThe paper describes a practical evasion attack on machine learning for Black-box android malware detection called EvadeDroid. This blog is originally written for CSCE 689:601 and is the 15th blog of the series: "Machine Learning-Based CyberDefenses"....Discuss#cybersecurity
Bhumika bhumiwrites.hashnode.dev·Mar 23, 2024Cyber security in the Age of Remote WorkIn the wake of the COVID-19 pandemic, remote work has evolved from a convenience to a necessity for many organizations worldwide. While this shift offers numerous benefits in terms of flexibility and efficiency, it also presents significant challenge...Discuss#cybersecurity
Allex Christianchristini.hashnode.dev·Mar 22, 2024Hands-On IoT Building Your First Application from Scratch in 2024Introduction Now, let’s turn the theory into practice! Building your first IoT application is a fantastic way to grasp the potential of the Internet of Things. By creating a simple project, you’ll gain hands-on experience with sensors, data collectio...DiscussIoT security