Jithu Josephjithu-joseph.hashnode.dev·Dec 20, 2024Navigating the Deepfake DilemmaWhat Are Deepfakes?Deepfakes are highly realistic but fake media - videos, images, or audio created using AI. By analyzing large amounts of real-world data, AI algorithms can mimic a person’s appearance, voice, and mannerisms so convincingly that it ...Security
Jithu Josephjithu-joseph.hashnode.dev·Dec 17, 2024Protecting Your Passwords: Simple Steps for a Safer Digital LifeImagine this: you wake up one morning, grab your phone, and see dozens of notifications about unusual activity on your accounts. Panic sets in as you realize someone has gained access to your personal information. Scenarios like this happen more ofte...passwords
Rosecurifylog.rosecurify.com·Dec 16, 2024Seclog - #104"Know your enemy, but first know their favorite social media password reset questions." - The Art of Cyber War 📚 SecMisc Library of Leaks - Public records research database for security awareness and analysis. Read More CPDoS Analysis - Technical...seclogseclog
REHAN SAYYEDdignitas.hashnode.dev·Dec 12, 2024Understanding CAN Bus and performing Replay AttackGetting started with Car Hacking, with an introduction to CAN Bus and hands-on with a basic replay attack. Objective Understanding CAN Bus vehicle communication network and getting hands-on with a basic replay attack in the network. Theory Introducti...1 like·41 readsCar Hackingcar hacking
Rosecurifylog.rosecurify.com·Dec 9, 2024Seclog - #103"In the realm of cyber, victory belongs not to the swiftest click, but to the most strategic mind." - The Art of Cyber War 📚 SecMisc VX Underground Giveaways - Platform listing donations and resources - Read More Everything Curl - Comprehensive gu...seclog#cybersecurity
Hitesh Patrablogs.hiteshpatra.in·Dec 4, 2024CVE-2024-54134 - Solana Web3.js Supply Chain AttackA supply chain attack was detected in version 1.95.6 and 1.95.7 of the @solana/web3.js npm library. This compromised version contain injected malicious code that can steal keys from developers and users, potentially enabling attackers to drain crypto...12 likes·99 readsCVE Analysissupplychainattack
Rosecurifylog.rosecurify.com·Dec 1, 2024Seclog - #102"Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago." - Sun Tzu 📚 SecMisc A Single Tracker for Cybersecurity Research Reports - Comprehensive tracker for various cybersecurity needs and research reports - Rea...#cybersecurity
Rosecurifylog.rosecurify.com·Nov 24, 2024Seclog - #101“Most APTs are not very advanced” - Sun Tzu, The Art of Cyber War 📚 SecMisc Paged Out! - A free magazine about programming, especially programming tricks. Read More 📰 SecLinks Pots and Pans, AKA an SSLVPN - Analysis of Palo Alto PAN-OS CVE-2024...seclog#cybersecurity
Rosecurifylog.rosecurify.com·Nov 17, 2024Seclog - #100"The enemy does not check your risk register prior to attacking." - Sun Tzu, The Art of Cyber War 📚 SecMisc PoisonTap - Exploiting locked computers through USB peripherals, demonstrating techniques to bypass security measures on locked machines. Re...seclogBlueHat2024
Jithu Josephjithu-joseph.hashnode.dev·Nov 15, 2024Cyber Resilience: More Than Just CybersecurityWhat is Cyber Resilience? Cyber resilience is the ability of an organization to adapt, prepare, respond, and recover from cyber threats, enabling it to continue critical operations despite disruptions. What Types of Threats Does Cyber Resilience Addr...41 likes·129 readsAI