Jithu Josephjithu-joseph.hashnode.dev路Nov 15, 2024Cyber Resilience: More Than Just CybersecurityWhat is Cyber Resilience? Cyber resilience is the ability of an organization to adapt, prepare, respond, and recover from cyber threats, enabling it to continue critical operations despite disruptions. What Types of Threats Does Cyber Resilience Addr...Discuss路33 likes路116 readsAI
Rosecurifylog.rosecurify.com路Nov 17, 2024Seclog - #100"The enemy does not check your risk register prior to attacking." - Sun Tzu, The Art of Cyber War 馃摎 SecMisc PoisonTap - Exploiting locked computers through USB peripherals, demonstrating techniques to bypass security measures on locked machines. Re...DiscussseclogBlueHat2024
Jithu Josephjithu-joseph.hashnode.dev路Nov 15, 2024Cyber Resilience: More Than Just CybersecurityWhat is Cyber Resilience? Cyber resilience is the ability of an organization to adapt, prepare, respond, and recover from cyber threats, enabling it to continue critical operations despite disruptions. What Types of Threats Does Cyber Resilience Addr...Discuss路33 likes路116 readsAI
Rosecurifylog.rosecurify.com路Nov 9, 2024Seclog - #99"To deceive your enemy, make your vulnerabilities appear as your strengths." - The Art of Cyber War 馃摎 SecMisc Movies for Hackers - A curated list of movies that hackers would enjoy - Read More 馃摪 SecLinks Hacking 700 Million Electronic Arts Acco...Discussseclogbrowser hacking
Aboelhamd Abdellatifaboelhmd.com路Nov 6, 2024Beginner Cybersecurity Tools: A Practical Guide to Wireshark, Nmap, and MetasploitIntroduction In the world of cybersecurity, tools like Wireshark, Nmap, and Metasploit are essential starting points for anyone looking to understand networks and digital security. Whether you're a novice eager to explore network analysis, scanning, ...Discuss#CyberTools
Rosecurifylog.rosecurify.com路Oct 26, 2024Seclog - #97馃摪 SecLinks Blog - Security research on Private Cloud Compute - Detailed research on Apple's Private Cloud Compute security infrastructure. Read More Against /tmp - An analysis of temporary directory security considerations. Read More Lose your de...Discussseclog#cybersecurity
cakehalohyperpwn.hashnode.dev路Oct 24, 2024Understanding TCP and UDP: The Backbone of Internet CommunicationIf you鈥檙e into IT, you鈥檝e likely heard the terms TCP and UDP. But what are those exactly? What are they used for? Why do we need them? In this article, I will answer these questions and explain why both protocols are crucial for modern networking. $ ...Discusslayer4
Rosecurifylog.rosecurify.com路Oct 19, 2024Seclog - #96"A network without shadows is a fortress in daylight; its enemies are hidden in plain sight." - The Art of Cyber War 馃摎 SecMisc End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem - An analysis of the current state of encrypted cloud...Discussseclogcloud security
Chama JennaneforfreeCodeCampfreecodecamp.org路Oct 9, 2024How to Strengthen Your Code: Essential Secure Design Principles for DevelopersSecure design principles have long been the foundation for building secure systems. And they remain a crucial aspect of modern cybersecurity. Introduced in 1975 by Saltzer and Schroeder in their landmark paper The Protection of Information in Compute...Discusssecure coding
Rosecurifylog.rosecurify.com路Oct 5, 2024Seclog - #94馃摎 SecMisc Tools Index | Hackers of India - A comprehensive index of hacking tools. Read More Unleash the Power of Censys Search - A guide for using Censys search effectively. Read More Lambda Watchdog - A monitoring tool for AWS Lambda functions....DiscussseclogCVE-2024-45409
Atharv Patilatharvpatil.hashnode.dev路Oct 3, 2024Understanding Server-Side Template Injection (SSTI)Server-Side Template Injection (SSTI) is a significant vulnerability in modern web applications, enabling attackers to inject malicious code into server-side templates. This flaw arises when user inputs are improperly handled and directly embedded in...Discuss路1 like路38 readsServer-Side Template Injection