Rosecurifylog.rosecurify.com·Dec 9, 2024Seclog - #103"In the realm of cyber, victory belongs not to the swiftest click, but to the most strategic mind." - The Art of Cyber War 📚 SecMisc VX Underground Giveaways - Platform listing donations and resources - Read More Everything Curl - Comprehensive gu...Discussseclog#cybersecurity
Hitesh Patrablogs.hiteshpatra.in·Dec 4, 2024CVE-2024-54134 - Solana Web3.js Supply Chain AttackA supply chain attack was detected in version 1.95.6 and 1.95.7 of the @solana/web3.js npm library. This compromised version contain injected malicious code that can steal keys from developers and users, potentially enabling attackers to drain crypto...Discuss·12 likes·91 readsCVE Analysissupplychainattack
Rosecurifylog.rosecurify.com·Dec 1, 2024Seclog - #102"Your enemy cares not that the maintainer of an Internet-connected server left 10 years ago." - Sun Tzu 📚 SecMisc A Single Tracker for Cybersecurity Research Reports - Comprehensive tracker for various cybersecurity needs and research reports - Rea...Discuss#cybersecurity
Rosecurifylog.rosecurify.com·Nov 24, 2024Seclog - #101“Most APTs are not very advanced” - Sun Tzu, The Art of Cyber War 📚 SecMisc Paged Out! - A free magazine about programming, especially programming tricks. Read More 📰 SecLinks Pots and Pans, AKA an SSLVPN - Analysis of Palo Alto PAN-OS CVE-2024...Discussseclog#cybersecurity
Rosecurifylog.rosecurify.com·Nov 17, 2024Seclog - #100"The enemy does not check your risk register prior to attacking." - Sun Tzu, The Art of Cyber War 📚 SecMisc PoisonTap - Exploiting locked computers through USB peripherals, demonstrating techniques to bypass security measures on locked machines. Re...DiscussseclogBlueHat2024
Jithu Josephjithu-joseph.hashnode.dev·Nov 15, 2024Cyber Resilience: More Than Just CybersecurityWhat is Cyber Resilience? Cyber resilience is the ability of an organization to adapt, prepare, respond, and recover from cyber threats, enabling it to continue critical operations despite disruptions. What Types of Threats Does Cyber Resilience Addr...Discuss·41 likes·129 readsAI
Rosecurifylog.rosecurify.com·Nov 9, 2024Seclog - #99"To deceive your enemy, make your vulnerabilities appear as your strengths." - The Art of Cyber War 📚 SecMisc Movies for Hackers - A curated list of movies that hackers would enjoy - Read More 📰 SecLinks Hacking 700 Million Electronic Arts Acco...Discussseclogbrowser hacking
Aboelhamd Abdellatifaboelhmd.com·Nov 6, 2024Beginner Cybersecurity Tools: A Practical Guide to Wireshark, Nmap, and MetasploitIntroduction In the world of cybersecurity, tools like Wireshark, Nmap, and Metasploit are essential starting points for anyone looking to understand networks and digital security. Whether you're a novice eager to explore network analysis, scanning, ...Discuss#CyberTools
Rosecurifylog.rosecurify.com·Oct 26, 2024Seclog - #97📰 SecLinks Blog - Security research on Private Cloud Compute - Detailed research on Apple's Private Cloud Compute security infrastructure. Read More Against /tmp - An analysis of temporary directory security considerations. Read More Lose your de...Discussseclog#cybersecurity
cakehalohyperpwn.hashnode.dev·Oct 24, 2024Understanding TCP and UDP: The Backbone of Internet CommunicationIf you’re into IT, you’ve likely heard the terms TCP and UDP. But what are those exactly? What are they used for? Why do we need them? In this article, I will answer these questions and explain why both protocols are crucial for modern networking. $ ...Discusslayer4