Nipun Hegdecodecloudcapital.hashnode.dev·Jul 19, 2024What is OWASP Top 10: History, Importance, and Detailed AnalysisIntroduction In the ever-evolving landscape of web security, the OWASP (Open Web Application Security Project) Top 10 has become an essential resource for developers and security professionals. This list identifies the most critical security risks to...DiscussOWASP TOP 10
Mahak Pandeymahakpandeyofficial.hashnode.dev·Jul 18, 2024NIST Cybersecurity Framework 2.0 UpdatesCybersecurity is an ever-evolving field, with new threats and technologies emerging rapidly. To help organizations avoid these challenges, the National Institute of Standards and Technology (NIST) recently released version 2.0 of its Cybersecurity Fr...Discuss·10 likesNIST 2.0
SKsk4clouddevops.hashnode.dev·Jul 15, 2024Understanding HTTP, HTTPS, SSL & TLS1. HTTP (Hypertext Transfer Protocol) What it is: HTTP is the foundational protocol used for transferring data on the web. Purpose: It allows browsers to communicate with web servers to fetch and display web pages. How it works: When you enter a URL ...DiscussSSL
Muhammad Abdel AalforKlivvrblog.klivvr.com·Jul 7, 2024The Invisible Threat: Combating Social Engineering in the Financial IndustrySocial engineering, a manipulative technique used by cybercriminals to deceive individuals into divulging confidential information, has emerged as a critical threat to the financial services sector. Unlike traditional cyberattacks that exploit techni...Discuss·94 readsSecuritySecurity
Ashutosh Mahajanashutoshamblogs.hashnode.dev·Jul 5, 2024Kubernetes Security with Authentication Mechanisms🗼Introduction In Kubernetes, the kube-apiserver serves as the core component that handles all operations within the cluster. Users and other components interact with the Kubernetes cluster through this API server, typically using the kubectl command...DiscussKubernetes
Adedayo Olaleyecodewithdedayo.hashnode.dev·Jul 5, 2024What is DevSecOps? An Introductory OverviewUnderstanding DevSecOps and How to Implement the Right Processes and Procedures DevSecOps, short for Development, Security, and Operations, is an approach that integrates security practices within the DevOps process. As software development continues...Discuss·26 readsDevops
VerifyVaultverifyvault.hashnode.dev·Jul 2, 2024Unveiling the Truth: Debunking Myths and Misconceptions about 2FAIn the ever-evolving landscape of cybersecurity, two-factor authentication (2FA) stands as a beacon of hope against data breaches and identity theft. Yet, despite its crucial role in safeguarding our online accounts, there are numerous myths and misc...Discuss2FA
Mr. K4l1m3r0k4l1m3r0.hashnode.dev·Jun 20, 2024Securing Your Business: Essential Cybersecurity Practices for OrganizationsIn today's digital age, businesses rely heavily on technology and data to operate efficiently. However, this dependence also creates vulnerabilities that cybercriminals exploit to steal sensitive information, disrupt operations, and cause financial l...Discuss#cybersecurity
Nguyen Duc Chinhblog.nguyenducchinh.com·Jun 13, 2024Beware behind the look: Cyrillic Characters in Phishing EmailsOne tactic gaining traction is the use of Cyrillic characters to create deceptive domain names in email addresses and website links. What are Cyrillic Characters? Cyrillic is an alphabet used in many Eastern European and Slavic languages like Russian...Discuss·27 readsSecuritysecurityawareness
Mahak Pandeymahakpandeyofficial.hashnode.dev·Jun 1, 2024Best Practices for Safe JavaScript "onclick" EventsIn the world of web development, ensuring the security of user interactions is paramount. One common area where security vulnerabilities can arise is in handling onclick events in JavaScript. These events are crucial for creating interactive web appl...Discuss- JavaScript onclick security - Secure onclick events - Prevent XSS attacks - JavaScript security best practices - Sanitize JavaScript user input - Safe JavaScript event handling - Content Security Policy for JavaScript - Preventing JavaScript vulnerabilities - JavaScript XSS mitigation - Secure web development practices