Aboelhamd Abdellatifaboelhmd.com·Oct 27, 2024Essential Tips for Personal Cyber HygieneIn today’s digital world, protecting personal information isn’t just a concern for large corporations—it’s something every individual should prioritize. Cyber hygiene, much like personal hygiene, consists of regular practices that keep you safe onlin...Discuss·1 likePublic Wi-Fi Security
Aboelhamd Abdellatifaboelhmd.com·Oct 23, 2024An In-Depth Look at the Verizon 2024 Data Breach Investigations ReportThe 2024 Data Breach Investigations Report (DBIR) by Verizon is a crucial document that outlines the latest trends and patterns in cybersecurity breaches. As organizations increasingly rely on digital infrastructures, understanding the landscape of c...DiscussCybersecurity Strategies
Chama JennaneforfreeCodeCampfreecodecamp.org·Oct 9, 2024How to Strengthen Your Code: Essential Secure Design Principles for DevelopersSecure design principles have long been the foundation for building secure systems. And they remain a crucial aspect of modern cybersecurity. Introduced in 1975 by Saltzer and Schroeder in their landmark paper The Protection of Information in Compute...Discusssecure coding
Akbar KhanforBreachForcebreachforce.net·Oct 6, 2024TryHackMe: ConvertMyVideoLink to Lab - https://tryhackme.com/room/convertmyvideo Lab Overview - My script to convert videos to MP3 is super secure. A perfect room to understand from basic enumeration to limiting findings abusing a single found web application functionality t...Discusstryhackme-lab
Aboelhamd Abdellatifaboelhmd.com·Sep 30, 2024Introduction to Cybersecurity: Why It MattersIn today’s interconnected world, cybersecurity has become more critical than ever. As our lives become increasingly digital, the risks associated with cyber threats grow exponentially. This article explores the importance of cybersecurity, recent sta...DiscussSecurityInsights
Akbar Khanakbarkhan.hashnode.dev·Sep 25, 2024Extracting NTLM Hashes with Mimikatz: A Step-by-Step Approach.Mimikatz is a powerful post-exploitation tool used by penetration testers, security researchers, and cyber attackers to interact with the Windows security model. Developed by Benjamin Delpy, it's widely known for its ability to extract plaintext pass...Discuss·1 like·133 readsmimikatz
Ronald Bartelshubandspoke.amastelek.com·Sep 24, 2024🥊The Misleading Narrative of "Secure" SD-WAN provided by using Firewalls🤼I want to address a growing concern within our industry: the pervasive and misleading claim that SD-WAN solutions are inherently "secure" simply because they include a firewall. This is yet another example of Silicon Valley's questionable marketing t...Discussppt
Akbar Khanakbarkhan.hashnode.dev·Sep 7, 2024Phishing in the ShadowsThis task will take you through setting up GoPhish, sending a phishing campaign and capturing user credentials from a spoof website. This is the tryhackme GoPhishing Labs Firstly launch the virtual machine by clicking the green Start Machine button o...Discuss·29 readsphishing
Sachins72tech.hashnode.dev·Sep 5, 2024Day 4 of My DevOps Journey: Learning Networking Essentials for DevOps.Welcome to Day 4 of your DevOps adventure! By now, you’ve mastered Linux and shell scripting—key skills that pave the way for understanding complex systems. Today, we’re diving into networking, a vital component in the DevOps toolkit. Networking isn’...Discuss·10 likesDevops
alice eneyoaliyo.hashnode.dev·Aug 24, 2024Day 5 of my cybersecurity journey on Coursera 🚀Today, I completed Day 5 of the Foundations of Cybersecurity course on Coursera. I've been delving into the fundamental principles of cybersecurity, gaining deeper insights each day. Key Takeaways: The importance of data confidentiality, integrity, ...DiscussLearning Journey