Gaurav Chaudharypixelgig.pro·8 minutes agoLearning Cyber Security For Programmers Day 3 — Essential Cybersecurity ToolsGreetings, security-conscious coders! We’ve delved into the dark side of cybersecurity, meeting the malicious actors and their tactics. Now, it’s time to build our arsenal! Today, we’ll explore some essential tools that every programmer-turned-cybers...DiscussCybersecurity Bootcamp: My Daily Grind to Expertiseprotect your code
Andreas RenzforEncryptoriumblog.encryptorium.com·13 hours agoThe Heartbleed Vulnerability: CVE-2014-0160The Heartbleed bug is one of the most significant security vulnerabilities that have impacted the internet, affecting millions of web servers and users' data security worldwide. Discovered in April 2014, Heartbleed was a severe flaw in OpenSSL, a wid...Discussheartbleed
Mike Elissenblog.securitylevelup.eu·Mar 26, 2024Five steps to improve your API security postureAPIs are foundational for many of the new capabilities that companies are building — but, in most cases, the security of APIs is either not considered early enough in the planning process or not able to keep up with the rapid deployment of new techno...DiscussAPIs
Jiyajiyajha.hashnode.dev·Mar 26, 2024Unlocking Secrets: The Intriguing World of Encryption Software and its Impact on Data SecurityData sent and received over the internet can be kept private and secure with encryption. Passwords, credit card details, conversations with coworkers, or even just sending family photos to friends and family might all fall under this category. Encryp...Discuss#encryptedcommunications
Natanblog.triplen.tech·Mar 25, 2024HTB - OOPArtDB Writeup\x00 - TLDR; To solve this web challenge I chained the following vulnerabilities:1. Using SSRF with DNSReinding attack in order to extract info from internal API.2. Perform CSRF attack using secret token to register user to the application.3. Using ...Discuss·69 readsHTB Challengeshtb
Stevenstoni.hashnode.dev·Mar 24, 2024What is shellcode and how do we use it to pop shells?C:\Windows\System32 > whoami I'm a Senior Penetration Tester with a keen eye on safeguarding network and Active Directory environments. My qualifications, highlighted by certifications like eJPTv1, PNPT, ICCA, CARTP, CNPen, and CRTE, speak to my expe...Discussmalware development
Nehal IngoleforRead & Learnlearnwithnehal.hashnode.dev·Mar 18, 2024Cyber Security And Confusion MatrixHello Everyone In this article we will discuss what role does Confusion Matrix plays in the Cybersecurity field?? As we all know that cybersecurity is very important as they are responsible for our security from cybercrime and the tools and tech they...DiscussFalseNegative
Jay Tillujaytillu.in·Mar 15, 2024What is the WEP Protocol in Networking?The Wired Equivalent Privacy Protocol, often abbreviated as WEP, was an early attempt to secure wireless network communication. It was introduced as part of the original IEEE 802.11 wireless networking standard, which is commonly known as Wi-Fi. Desi...DiscussNetworkingWEP
Jay Tillujaytillu.in·Mar 15, 2024Difference between POP, IMAP and SMTPEver wondered how your email magically appears on your phone, computer, or tablet? The answer lies in a trio of hardworking protocols: POP (Post Office Protocol), IMAP (Internet Message Access Protocol), and SMTP (Simple Mail Transfer Protocol). Each...DiscussNetworking#cybersecurity
Jay Tillujaytillu.in·Mar 15, 2024What is SMTP in Networking?SMTP, or Simple Mail Transfer Protocol, is the standard protocol used for sending email messages across networks. SMTP isn't directly involved with how you view or manage your emails. Instead, it acts as the communication channel between email client...DiscussNetworkingSecurity