Prajoti Raneprajotirane.hashnode.dev·3 hours agoLinkedIn Data Breach: Analyzing the 2012 breach resulting in stolen user credentials.Technical Analysis of the 2012 LinkedIn Data Breach: Decrypting the Theft of User Credentials The 2012 LinkedIn data breach remains one of the most notable incidents in cybersecurity history, involving the compromise of millions of user credentials....DiscussBlogging
Prajoti Raneprajotirane.hashnode.dev·Apr 6, 2024Target Data Breach: A Case Study in Cybersecurity Failures and Lessons LearnedIn the annals of cybersecurity breaches, few incidents have had the lasting impact and repercussions as the Target data breach of 2013. This watershed moment not only exposed the vulnerabilities of one of America's largest retailers but also served a...DiscussTarget data breach, cybersecurity failures, cyber attack timeline, technical details of breach, breach mitigation strategies, security measures, lessons learned from breach
Kaustubh RaiforBreachForcebreachforce.net·Mar 9, 2024Streamlining Security Assessments with BChecksAll of us - security professionals - use Burp Suite every day, whether as red teamers or blue teamers. With our experience in the industry, we've encountered scenarios where we'd like to remember specific test cases for particular categories. We ofte...Discuss·10 likes·62 readsbchecks
Yogendra Porwalqasimple.hashnode.dev·Mar 5, 2024Empowering Api Security Testing With Pynt And PytestIn today's API-driven landscape, robust security testing is paramount. Pynt, a powerful API security testing tool, seamlessly integrates with pytest, the popular Python testing framework, streamlining your workflow and enhancing test coverage. This a...DiscussSecurity
Stellar Cyberstellarcyber.hashnode.dev·Feb 15, 2024Leverage the tools and telemetry you trustThe industry is at a pivotal point. With the pandemic driving up work-from-home and forcing hybrid work environments as well as many applications moving to the cloud, cybersecurity professionals are challenging best practices and once-thought foundat...Discusssecurity testing
Stellar Cyberstellarcyber.hashnode.dev·Feb 14, 2024A Security Discussion Around SunburstWhat was the sunburst attack and how can MSPs protect themselves against in the future? That’s what we’ll be discussing in today’s episode. Episode Highlights: What is sunburst? Can it be protected against? Would a SIEM guard against this? What i...Discusssecurity testing
Malavikaviksmals.hashnode.dev·Feb 11, 2024Running Vulnerability Scans for Spark Third Party PackagesIf you use Spark in your codebase, chances are you also use some popular third-party packages to work with Spark. What does this mean from a security perspective? Your application may have some security vulnerabilities introduced due to these third-p...DiscussSpark For Data Science
Abhayabhayit2000.hashnode.dev·Jan 23, 2024Implementing App Security – Here’s How To Do ItApplication security incorporates measures to prevent unauthorized access, data breaches, and other security threats in software development. It’s essential to implement proper security measures to ensure the safety of your applications; this entails...Discuss·105 readsMobile apps
Vimal Girija Vbuddy4tostudy.hashnode.dev·Jan 15, 2024Security Testing : IntroductionIntroduction In today's digital landscape, cybersecurity is paramount. With the ever-growing sophistication of cyber threats, organizations need to adopt a proactive approach to safeguarding their systems and sensitive data. One crucial component of ...Discuss·26 readsComprehensive Guide to Security Testing: Ensuring Robust Cybersecuritysecurity testing
RivanorthProblog.rivanorth.com·Jan 8, 2024Hack Explained - Gamma StrategiesGamma Strategies, an Arbitrum-based decentralised finance (DeFi) protocol specialising in liquidity management, recently experienced a significant security breach. This protocol, which allows users to invest in 'hypervisors' or liquidity pools for ac...DiscussNewssecurity breach