Ben-Hur Santos OttforGuia de AppSec :: Blogblog.guiadeappsec.com.br·32 minutes agoAppSec Newsletter 0009[vídeo] Using IAST to Unlock the Benefits of DevSecOps • Jeff Williams • YOW! 2022 [artigo] How to switch to a ModSecurity WAF alternative before it is EOL in March 2024? [site] Web AppSec Interview Questions by Tib3rius [framework] SSDF - Secure ...Discussappsec
Pradip Deyp3ntesterinstanc3.hashnode.dev·13 hours agoFormat HTB Walkthrough/WriteupThe “Format” machine is created by coopertim13. This is a medium HTB machine with a strong emphasis on Redis usage and the orchestration of chained attacks. Enumeration Using Nmap nmap -sC -sV -O 10.10.11.213 -A -T4 --min-rate=1000 Nmap scan report ...Discussoffensive-security
Grace Edwingracedwin.com·Sep 23, 2023Embarking on the Cybersecurity Journey: My BeginningsOne fundamental truth stands out in the catch of cybersecurity: a thorough understanding of computer networks is the foundation of proficiency. As I embarked on this thrilling journey, the importance of unraveling the complex structure of networks be...Discuss·10 likes·39 reads#cybersecurity
Joel Odeyohekpejeodey.com·Sep 23, 2023Unleashing Splunk: A Guide to Elevating Cybersecurity in OrganizationsIn the digital age, where data flows like a river and threats lurk in the shadows, organizations are on a constant quest to fortify their cyber defences. Enter Splunk, a potent tool that shines a spotlight on data and empowers organizations to detect...DiscussSplunkSplunk
Joel Odeyohekpejeodey.com·Sep 23, 2023Cybersecurity Techniques Unveiled: Your Shield in the Digital RealmIn the intricate dance between technology and security, cybersecurity emerges as the sentinel guarding our digital castles. Much like a vigilant guardian, it employs an array of techniques to ward off potential threats and breaches. In this article, ...Discusstechniques
Joel Odeyohekpejeodey.com·Sep 23, 2023Essential Information-Gathering ToolsHey, fellow digital detectives! Ready to uncover the world of information gathering? Here's a comprehensive list of tools to supercharge your cyber-investigations. Shodan - The search engine for the Internet of Things (IoT). Find vulnerable devices ...Discuss#cybersecurity
Dhananjay kulkarnidhananjaykulkarni.hashnode.dev·Sep 23, 2023Python BasicsIn the first part of our "Python for Scripting" series, we introduced Python, its use cases, and features, and even ran a simple "Hello World" script. In this second installment, we're going to dive deeper into Python and explore its fundamental buil...Discuss·1 likePython For ScriptingPython
Dhananjay kulkarnidhananjaykulkarni.hashnode.dev·Sep 22, 2023Python Scripting: Unleash the Power of AutomationIntroduction Python is a programming language that has captured the hearts of developers and scriptwriters alike. Its simplicity, versatility, and readability make it an ideal choice for scripting tasks. In this blog, we will explore what Python is, ...Discuss·2 likes·31 readsPython For ScriptingPython
Sameer Dasakacyberinsights.hashnode.dev·Sep 21, 2023Threat Actor "Seize" Offering Ergon Ransomware-as-a-Service on BreachForums 2Executive Summary On September 22, 2023, an underground forum member using the pseudonym "seize" unveiled Ergon, a cutting-edge Ransomware-as-a-Service (Raas) on BreachForums 2. Ergon, as described by seize, boasts full undetectability (FUD), effortl...Discussransomware
Panagiotis Vasilikossecuringbits.com·Sep 20, 2023GitHub RepoJackingHave you heard of GitHub RepoJacking? 💀 Ilay Goldman (@goldmanilay) and Yakir Kadkoda (@YakirKad) from the Aqua Security Team have discovered 37k vulnerable repositories that are at risk of RepoJacking, posing a significant threat to organizations.DiscussApplication Security