Jithu Josephjithu-joseph.hashnode.dev·Dec 20, 2024Navigating the Deepfake DilemmaWhat Are Deepfakes?Deepfakes are highly realistic but fake media - videos, images, or audio created using AI. By analyzing large amounts of real-world data, AI algorithms can mimic a person’s appearance, voice, and mannerisms so convincingly that it ...Security
Jithu Josephjithu-joseph.hashnode.dev·Dec 17, 2024Protecting Your Passwords: Simple Steps for a Safer Digital LifeImagine this: you wake up one morning, grab your phone, and see dozens of notifications about unusual activity on your accounts. Panic sets in as you realize someone has gained access to your personal information. Scenarios like this happen more ofte...passwords
Dharm Joshidharmjoshi.hashnode.dev·Dec 14, 2024Cerbos:- Authorization-as-a-ServiceIntroduction Software development is more about thinking of unique solutions for solving greater problems in this modern era. Times were gone, when one has to think about the syntax or the implementation of code in any one programming language. This...authorization
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Live Host DiscoveryIntroduction We can find live hosts on a network by using any of the 3 scans that are named below: ARP scan: This scan uses ARP requests to discover live hosts ICMP scan: This scan uses ICMP requests to identify live hosts TCP/UDP ping scan: This ...Network Mapper - NMAPnmap
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Basic Port Scans - NMAPNmap Basic Port Scans INTRODUCTION The next step would be checking which ports are open and listening and which ports are closed. Therefore, in this room and the next one, we focus on port scanning and the different types of port scans used by nmap. ...Network Mapper - NMAPnmap
Hitesh Patrablogs.hiteshpatra.in·Dec 4, 2024CVE-2024-54134 - Solana Web3.js Supply Chain AttackA supply chain attack was detected in version 1.95.6 and 1.95.7 of the @solana/web3.js npm library. This compromised version contain injected malicious code that can steal keys from developers and users, potentially enabling attackers to drain crypto...12 likes·99 readsCVE Analysissupplychainattack
Jithu Josephjithu-joseph.hashnode.dev·Nov 15, 2024Cyber Resilience: More Than Just CybersecurityWhat is Cyber Resilience? Cyber resilience is the ability of an organization to adapt, prepare, respond, and recover from cyber threats, enabling it to continue critical operations despite disruptions. What Types of Threats Does Cyber Resilience Addr...41 likes·129 readsAI
Neviar Rawlinsonneviarrawlinson.hashnode.dev·Nov 15, 2024From Military Discipline to IT Leadership: Lessons for Developers and ManagersLeadership is a universal skill, but its application often varies depending on the environment. Having transitioned from a military background to IT leadership, I’ve seen firsthand how the principles of discipline, resilience, and adaptability—core t...leadership
Merbin Russelblog.merb.in·Nov 13, 2024Distroless: Balancing Security with PracticalityDistroless images are a type of Docker image designed to be as minimal as possible, containing only the essential components required to run a specific application. Advocates of Distroless claim that this minimalism enhances security by reducing the ...93 readsdistroless
Mohammad Ariful Islamthe-arif-cipher.hashnode.dev·Nov 11, 2024Understanding Randomized MAC Addresses for Better PrivacyIn today’s hyper-connected world, privacy is more important than ever. Devices we carry and connect with other networks leave digital traces wherever we go, making our privacy increasingly elusive. One way that our privacy can be protected is by empl...41 readsCyber Security Reflectionprivacy