Matt Biedronskiblog.gonskicyber.com·Feb 4, 2025A Real-World Analysis of Security Risks in Telephony SystemsFollow along as I recount a real-world toll fraud attack which targeted corporate VoIP infrastructure and unfortunately led to serious monetary damages. In this blog, I share my investigation process, some interesting findings, and lessons learned. T...112 readshacking
Amit Saraswatamit5148.hashnode.dev·Feb 2, 2025Debunking the Myth: Base64 Encoding is Not a Security MeasureWhat is base64? Base64 is a group of binary-to-text encoding schemes that transforms binary data into a sequence of printable characters, limited to a set of 64 unique characters. Why is base64? As with all binary-to-text encoding schemes, Base64 is ...53 readsBase64
Sugam Aroracodewhizsugam.hashnode.dev·Feb 2, 2025Defend, Detect, Dominate: The UltimateIntroduction The digital revolution has ushered in an era of unparalleled connectivity — and unprecedented threats. Cybersecurity professionals are the vanguard against cybercrime, tasked with protecting sensitive data and critical infrastructures. ...10 likes#cybersecurity
Prakas Ranaprakasrana.hashnode.dev·Feb 2, 2025Deploy One-Time Secret – Secure One-Time Password/Message Sharing App with Docker and Docker Compose🚀 One-Time Secret is a secure one-time message sharing application that allows you to generate self-destructing secret links. It ensures that sensitive information is shared securely. 🔗 Official GitHub Repository: One-Time Secret GitHub In this blo...onetimesecrect
Harshi Nikunj ShahforCoding Addacodingadda.hashnode.dev·Jan 18, 2025Understanding Databases: A Comprehensive Guide for DevelopersIntroduction In this blog, we dive deep into databases, unraveling concepts that are essential for developers across all levels. Whether you're a front-end enthusiast, back-end expert, or aspiring full-stack developer, this guide provides you with ac...12 likes·27 readsDev Exchangedatabase expert
Kyle Arittarittkyle.hashnode.dev·Jan 16, 2025Safeguard Your Network: Eliminating Exploit VulnerabilitiesCyber threats are constantly evolving, and attackers are always on the lookout for weak spots in systems to gain unauthorized access. One of the most effective tactics used in initial access attacks involves exploiting unpatched vulnerabilities. Thes...ExploitPrevention
Rishi Bakshirishibakshi.hashnode.dev·Jan 7, 2025Understanding Public and Private Key CryptographySo, you're curious about end-to-end encryption (E2EE)—who wouldn't be, right? But before diving into how E2EE works, it's essential to understand a fundamental concept: public and private keys. These keys are your unique cryptographic identity and th...End-To-End-Encryptionpublic key
Rupal Singhalrupalsinghal.hashnode.dev·Jan 1, 2025Common security issues in JavaScript applicationsJavaScript applications can be vulnerable to various security issues, particularly because of their widespread use in web development. Here are some common security concerns and their potential mitigations: 1. Cross-Site Scripting (XSS) What happen...1 likeJavaScript
Shuka Zubaidatshukazuby.hashnode.dev·Dec 31, 2024Cracking the Code: Top Takeaways from 2024 in Backend DevelopmentAs the year draws to a close, it’s a perfect time to reflect on the milestones, challenges, and trends that have shaped my journey as a backend developer in 2024. This year has been pivotal for my growth, marked by exciting projects, evolving technol...Node.js
Yaakulyasecurenet.hashnode.dev·Dec 22, 2024Implementing a Password Strength Checker in PythonPasswords are the frontline of security for digital systems, yet many users still rely on weak passwords. To help promote better password practices, we’ll build a simple but effective password strength checker in Python. This blog will guide you thro...10 likes·26 reads#cybersecurity