Abhiramcloudbuddy.hashnode.dev·15 hours agoThe Future of Vulnerability ManagementThe cybersecurity landscape is constantly evolving, with new threats emerging daily. Traditional vulnerability management practices, while essential, are often struggling to keep pace with the rapid changes in technology and the sophistication of cyb...DiscussVulnerability management
Mohammd Reza Geramiariyagerami.hashnode.dev·Jul 25, 2024Vulnerability Assessments🔍 Understanding Vulnerability Assessments: Protecting Your Digital Systems 🔍In the ever-evolving world of cybersecurity, staying ahead of potential threats is paramount. One of the key tools in our arsenal is the vulnerability assessment. But what ...Discuss#cybersecurity
microbytesecmicrobytesecurity.hashnode.dev·Jul 24, 2024TurboCharge Your Nmap Scan: Five Hacks 🧿🔍Overview: This post will explore five Nmap hacks and tips that security researchers and ethical hackers can use to optimize their scans, enhancing workflow and automation. Understanding Nmap Default Scan To grasp Nmap's scan timing, let's start with ...Discuss·40 reads#cybersecurity
The Intel Chroniclesintelchronicles.com·Jul 22, 2024Splunk Enterprise Hit by Critical Path Traversal Vulnerability: CVE-2024-36991Executive Summary On 17 July 2024, an arbitrary file read vulnerability in the Splunk Enterprise installations/deployments was identified by the SonicWall Capture Labs cyber threat research team. The vulnerability tracked as CVE-2024-36991. This vuln...Discuss·7 likes·100 readsVulnerability IntelligenceSplunk
アリフリュウzoelabbb.hashnode.dev·Jul 19, 2024What is XSS Attack?Cross-Site Scripting (XSS) is a type of security vulnerability typically found in web applications. It allows attackers to inject malicious scripts into web pages viewed by other users. These scripts can then execute in the context of the user's brow...DiscussXSS
Yoel Feuermannfeuermann.hashnode.dev·Jul 19, 20245 Common Best Practices to Have in Mind When Upgrading Your SoftwarePhoto by Neeqolah Creative Works on Unsplash Upgrading your platform? A Java version or perhaps Spring Boot? A .Net framework upgrade? Or maybe making the move from Python 2 to 3… Let’s face it, performing such a major software upgrade is hardly eve...Discussupgrade
The Intel Chroniclesintelchronicles.com·Jul 10, 2024Critical Outlook Vulnerability CVE-2024-38021 Patched by Microsoft - Remote Code Execution Without ClicksExecutive Summary Microsoft addressed the CVE-2024-38021 critical vulnerability affecting the Microsoft Outlook that allows remote code execution without user interaction or authentication. Experts from Morphisec also reported that this flaw could le...Discuss·56 readsVulnerability IntelligenceMicrosoft
The Intel Chroniclesintelchronicles.com·Jul 9, 2024SnailLoad (CVE-2024-39920): Unveiling a New Side-Channel Threat to Your Online PrivacyExecutive Summary On July 3, 2024, researchers from Graz University of Technology discovered a vulnerability, designated as CVE-2024-39920 (SnailLoad), in the Transmission Control Protocol (TCP), which is crucial for ensuring reliable data transmissi...DiscussVulnerability Intelligencesnailload
Magda Jankowskamagdajankowska.hashnode.dev·Jun 23, 2024Deep Dive into the most common attacks on smart contracts1. Reentrancy Attacks Description Reentrancy occurs when a contract calls an external contract which then calls back into the original contract before the initial execution is complete. This can lead to unexpected behavior and allow attackers to repe...DiscussBlockchain
ByteScrum TechnologiesforByteScrum Technologiesblog.bytescrum.com·Jun 13, 2024Python for Cybersecurity: Writing Scripts for Ethical HackingPython has become a go-to language for cybersecurity professionals and ethical hackers due to its simplicity, readability, and extensive libraries. This guide will introduce you to writing Python scripts for ethical hacking, demonstrating how to use ...Discuss·95 likes·162 readsPythonpassword cracking