Vishesh Raghuvanshivisheshraghuvanshi.hashnode.dev·May 24, 2024Cloud Computing - 4Cloud Security Fundamentals Cloud security is a critical aspect of cloud computing, ensuring that data, applications, and services are protected from various threats. Understanding the fundamentals of cloud security involves examining the key princip...4 likes·50 reads2Articles1Week
David WOGLOdavidwoglo.hashnode.dev·Dec 25, 2023From legacy to cloud serverlessWelcome to the third part of this serie! In this segment, we dive into testings and pipeline configuration on Google Cloud, specifically focusing on continuous integration using Cloud Build, On-demand Vulnerability Scanner, and Artifact Registry. You...112 readsFrom legacy to cloud serverlessgoogle cloud
Pace Robertsbearcat.hashnode.dev·Nov 7, 2023Penetration Testing: Uncovering Vulnerabilities in Your NetworkIntroduction In today's hyperconnected world, where the internet plays a pivotal role in both our personal and professional lives, the security of our digital networks is of paramount importance. Cyberattacks and data breaches have become commonplace...50 readspenetration testing
Kevin Tauchmankevbotsec.hashnode.dev·Aug 21, 2023CVE Series: Confluence RCEWhat is Confluence? Confluence is a widely used collaborative software designed to streamline teamwork and knowledge sharing within organizations. Developed by Atlassian, Confluence provides a digital platform where teams can create, share, and organ...atlassian
Davies Parkertsaaro.hashnode.dev·Jul 24, 2023Vulnerability Assessment & Penetration TestingINTRODUCTION With the development of the internet and the growing number of business entities in the digital domain, the importance of safety for networks hosted by such organisations cannot be overstated. Security methods such as the evaluation of v...29 readsvape
Rian Alsagheerrianhussein.hashnode.dev·Jul 23, 2023The Vulnerability Assessment Process and How To Perform ItThere is no system, process, infrastructure, and environment that is 100% free from vulnerabilities. Those vulnerabilities are usually caused by design flaws, bugs bad implementation, lack of updates, and many other causes that attackers or malicious...vulnerability
Techlatest.nettechlatest.hashnode.dev·Jun 21, 2023How to Install Browser-Based Kali Linux with 2500+ security apps From Azure MarketplaceIntroduction Browser-based Kali Linux refers to a version of the Kali Linux operating system that can be run directly from a web browser, without the need for installation or a separate virtual machine. It is a cloud-based version of Kali Linux, whic...103 readsKali Linux
Techlatest.nettechlatest.hashnode.dev·Jun 21, 2023How to Install Browser Based Kali Linux with 2500+ security apps on Google Cloud Platform(GCP)Introduction Browser-based Kali Linux refers to a version of the Kali Linux operating system that can be run directly from a web browser, without the need for installation or a separate virtual machine. It is a cloud-based version of Kali Linux, whic...121 readsKali Linux
Techlatest.nettechlatest.hashnode.dev·Jun 21, 2023How to Install Browser-Based Kali Linux with 2500+ security apps On Amazon Web Services(AWS)Introduction Browser-based Kali Linux refers to a version of the Kali Linux operating system that can be run directly from a web browser, without the need for installation or a separate virtual machine. It is a cloud-based version of Kali Linux, whic...196 readsKali Linux
STIPΞNforNubsec's Communitynubsec.hashnode.dev·Jun 18, 2023Setup Nessus in DockerHow to Setup Nessus Vulnerability Scanner in Docker Requirements: Docker Guide: Get the Nessus activation code from the Tenable website: https://www.tenable.com/products/nessus/nessus-essentials Start docker and run the command below : docker...Vulnerability Assessment