Mohammd Reza Geramiariyagerami.hashnode.dev·Jul 25, 2024Enhancing network defenceEnhancing network defence requires staying ahead with the latest tools and technologies. Here's a roundup of cutting-edge solutions: 🤖 AI-Powered Security Analytics: Use AI and ML algorithms for real-time analysis, boosting threat detection and re...DiscussNetworkDefense
Rosecurifylog.rosecurify.com·Jul 20, 2024Seclog - #83📚 SecMisc Unsaflok - Unsaflok is a series of serious security vulnerabilities in the Saflok brand of hotel locks. Read More Index of /ubuntu/ubuntu/ubuntu/ubuntu/.. - Directory listing of Ubuntu archives. Read More 📰 SecLinks Global Microsoft ...Discuss·4 likesseclogSecurity
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jul 14, 2024Baby - VulnlabEnumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...Discussjpfdevs cybersec
Rosecurifylog.rosecurify.com·Jul 13, 2024Seclog - #82📚 SecMisc beaconDB - An advanced database for security researchers and analysts. Read More BLAST RADIUS - A platform focused on visualizing and understanding the impact of security breaches. Read More Deep-ML - A cutting-edge tool leveraging deep...Discuss·1 likeseclogSecurity
Blessing Mufaro Kashavathecyberstash.hashnode.dev·Jul 10, 2024PNPT Certification ReviewForeword While many articles discuss TCM Academy’s PNPT certification, I felt compelled to write my own review. Exceptional work deserves continuous praise and acknowledgment. This concise review aims to share my personal sentiments about the certifi...Discuss·26 readsCybersecurity Insightinfosec
VerifyVaultverifyvault.hashnode.dev·Jul 4, 2024Don't Be a Victim: The Ultimate Guide to Defending Against Cybersecurity ThreatsIn today's hyper-connected world, cybersecurity is more crucial than ever. From personal data breaches to corporate espionage, the threats are real and ever-evolving. Imagine waking up one day to find your bank account emptied or your identity stolen...Discuss2FA
Kaustubh RaiforBreachForcebreachforce.net·Jul 1, 2024Understanding Sources and Sinks: A Guide to Taint AnalysisDuring testing or code reviews, it’s crucial to understand how users input flows through a system. The ability to read the code of the application and understand it thoroughly is just as important as breaking that application. This understanding enab...Discuss·122 readswhat is sink and source
aisha javedcyberurdu.hashnode.dev·Jun 24, 2024Starting Career in CybersecurityHow to Start a Career in Cyber Security What is Cyber Security Career in Pakistan? سائبر سیکیورٹی میں اپنا کیریئر کیسے شروع کریں۔ پاکستان میں سائبر سیکیورٹی کیریئر کیا ہے؟ اس مضمون میں ہم سائبر سیکیورٹی میں اپنا سفر شروع کرنے میں آپ کی مدد کے لیے...Discuss#PenetrationTesting
Rosecurifylog.rosecurify.com·Jun 15, 2024Seclog - #78📚 SecMisc Fuzz Map - A tool for fuzzing and discovering vulnerabilities. Read More WTFProxy - Rotating residential proxies for your scraping needs. Read More 📰 SecLinks Private Cloud Compute: A new frontier for AI privacy in the cloud - Blog b...Discussseclogseclog
Sergio Medeirosgrumpz.net·May 4, 2024Finding a Basic RCE Vulnerability on a Prominent News ChannelUsually, when newcomers approach me in the bug bounty field, they often ask about the tools, methods, and any other "secret sauce" I use when searching for vulnerabilities in bug bounty programs. I'm sure many of them might feel I sound arrogant or c...Discuss·12 likes·430 readsMy Security Researchhacking