Christopher Akintoyechristopher-akintoye.hashnode.dev·Apr 6, 2024A Comprehensive Guide to Cybersecurity for Remote WorkersIntroduction The nature of work has changed significantly in recent years, with remote work becoming a more common and frequently chosen kind of employment. Remote work arrangements have transformed the way individuals and organizations function by p...Discuss·4 likes#cybersecurity
Jiyajiyajha.hashnode.dev·Mar 26, 2024Unlocking Secrets: The Intriguing World of Encryption Software and its Impact on Data SecurityData sent and received over the internet can be kept private and secure with encryption. Passwords, credit card details, conversations with coworkers, or even just sending family photos to friends and family might all fall under this category. Encryp...Discuss#encryptedcommunications
Terminal Intelligence Securityterminalintelligencesecurity.hashnode.dev·Mar 10, 2024Perfection HTB WriteupDuring enumeration, it was noticed that Input validation bypass refers to exploiting weaknesses in an application’s validation checks to submit malicious data that bypasses intended restrictions. Attackers use techniques like filter evasion, context ...Discuss·508 readsPerfection-walkthrough,
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Feb 24, 2024Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution VulnerabilityOverview This article explores a vulnerability discovered a few months ago in Google Chrome's V8 JavaScript engine. The vulnerability was fixed via a Chrome update on January 16, 2024, and was assigned the number CVE-2024-0517. The vulnerability aris...Discussvulnerability
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Feb 21, 2024Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)Recently, the Threat Research Unit of Qualys Company disclosed a Glibc vulnerability. The Glibc library has a buffer overflow vulnerability when processing environment variables, which can lead to local privilege escalation. This vulnerability affect...Discuss#cybersecurity
Romana VasylehaforPangea Blogpangea.cloud·Jan 31, 2024Developer Newsletter - January 2024🏛️ Pangea on Capitol Hill “This was a visit where we had the opportunity to interact with law and policy makers, and their staffers, on the topics that keep all of us in software and security up at night…The standard behavior in software development...Discussnewsletter
Adarsh Pratap Singhshivangthakur579.hashnode.dev·Jan 18, 2024Important Question on Cyber Security and Its LawAn Information System is an interconnected set of components used to collect, store, process and transmit data and digital information. It is a collection of hardware, software, network, data, people and process that work together to transform raw da...Discuss·1 like·90 readsapplications security
sridhar nalagatlasridharnalagatla.hashnode.dev·Jan 5, 2024Securing Docker Containers: Best Practices and StrategiesDocker containers have revolutionized application deployment and scaling. However, with great convenience comes the need for robust security practices. In this tutorial, we will explore best practices for securing Docker containers. We’ll cover strat...DiscussDocker
TimoProtimocodes.hashnode.dev·Dec 22, 2023The Importance of Google DorksIntroduction In the dynamic landscape of cybersecurity, professionals are constantly seeking tools and techniques to bolster their defense strategies. For SOC Analysts and penetration testers, particularly those engaged in examining attack vectors wi...Discuss·11 likes·352 reads#cybersecurity
Anish Sunejaanishsuneja.hashnode.dev·Dec 13, 2023Decoding Deauth: How to kick your friend out of your WiFi ?Introduction: In the domain of ethical hacking and cybersecurity, network monitoring and sniffing play a crucial role in understanding and securing wireless networks. Aircrack-ng, a powerful suite of tools, provides surplus functionalities to manage,...Discuss·24 likes·277 readsEthical Hacking