Mike BunnerProwww.badsamurai.dev·Sep 28, 2023.Zip Was Approved 10 Years Ago and No One NoticedJuly 26, 2013 a Google employee—now a senior director—submitted the .zip domain to ICANN. Nearly a decade later, and without much fanfare, Google released .zip for registration. This confounding decision sparked a wildfire of phishing domain registra...Discuss·51 readscybersecurity
Grace Edwingracedwin.com·Sep 23, 2023Embarking on the Cybersecurity Journey: My BeginningsOne fundamental truth stands out in the catch of cybersecurity: a thorough understanding of computer networks is the foundation of proficiency. As I embarked on this thrilling journey, the importance of unraveling the complex structure of networks be...Discuss·10 likes·44 reads#cybersecurity
Joel Odeyohekpejeodey.com·Sep 23, 2023Guiding Lights: Practical Steps to Implement Splunk for Cybersecurity within OrganizationsIn the realm of cybersecurity, where threats loom like shadows, organizations are in constant pursuit of tools that illuminate the darkness and enhance their defences. Splunk, with its prowess in data analysis and insights, emerges as a beacon to gui...DiscussSplunkSplunk
Joel Odeyohekpejeodey.com·Sep 23, 2023Footprinting vs. ReconnaissanceFootprinting: Exploring the Digital Footprint Hey there, cyber explorers! Have you ever wondered how hackers gather information before launching their cyberattacks? It all begins with Footprinting! What is Footprinting? Footprinting is like the detec...Discusscybersecurity
CyberFreak999cyberfreak.hashnode.dev·Sep 18, 2023Governance, Risk and Compliance: The non-technical side of CybersecurityCybersecurity is often dominated by sophisticated hacks, advanced technology, and complex coding. A fundamental aspect, however, operates largely in the shadows -- Governance, Risk, and Compliance (GRC). Governance, Risk, and Compliance (GRC) is a wa...Discuss·40 readsCybersecuritycybersecurity
Kamaldeep Singhthekamalsingh.hashnode.dev·Sep 18, 2023Cybersecurity Essentials for DevelopersCybersecurity is the practice of protecting systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. In today's digital world, cybersecurity is more important than ever before. Developers play a...Discuss#cybersecurity
Chamali Wedagechamaliwedage.hashnode.dev·Sep 18, 2023Cyberspace is in danger!Now you’ll definitely ask, WHY? and HOW? As a result of the globalization, we all live in a digital world. The internet has become the major source which is all people can rely on. In the modern day, lots of people share most sensitive and private da...Discusscyberspace
Rodney Mhungurodneymhungu.com·Sep 12, 2023Data Security and the Evolution Beyond DLP: The Journey Starts HerePicture this: a new hire, eager to prove their value but not yet fully versed in corporate protocol, accidentally leaks internal corporate data via email to an external party. Or, a highly-anticipated press release – expected to make waves in your in...Discuss·110 readsMicrosoft
Haneunhanlee.hashnode.dev·Sep 10, 2023What is Session Prediction?Definition Session Prediction is a security vulnerability where an attacker predicts session identifiers to hijack or forge another user's session. Session identifiers are typically used in the form of cookies, tokens, or session IDs to maintain a us...DiscussCyber Securitycybersecurity
Haneunhanlee.hashnode.dev·Sep 10, 2023What is Session Fixation?Definition Session Fixation is one of the vulnerabilities that can occur in web application security. This vulnerability refers to a situation where an attacker gains access to an authenticated session by controlling the user's session identifier. Po...DiscussCyber Securitycybersecurity