Abhiramcloudbuddy.hashnode.dev·15 hours agoThe Future of Vulnerability ManagementThe cybersecurity landscape is constantly evolving, with new threats emerging daily. Traditional vulnerability management practices, while essential, are often struggling to keep pace with the rapid changes in technology and the sophistication of cyb...DiscussVulnerability management
Goodycybgoodycyb.hashnode.dev·Jul 5, 2024Exploiting Lambda Vulnerabilities for Privilege Escalation in AWSIntroduction In this lab, you start as the 'bilbo' user. You will assume a role with more privileges, discover a lambda function that applies policies to users, and exploit a vulnerability in the function to escalate the privileges of the Bilbo user ...DiscussPractical Cl⛅d Security Labsaws lambda
Cloud Tunedcloudtuned.hashnode.dev·Jun 4, 2024Understanding Cross-Site Request Forgery (CSRF)Understanding Cross-Site Request Forgery (CSRF) Cross-Site Request Forgery (CSRF) is a type of security vulnerability that occurs when an attacker tricks a user's browser into executing unwanted actions on a web application where the user is authenti...Discusscsrf
Cloud Tunedcloudtuned.hashnode.dev·Jun 3, 2024Exploring Trivy: A Comprehensive Vulnerability Scanner for Containers and MoreExploring Trivy: A Comprehensive Vulnerability Scanner for Containers and More Introduction In the fast-paced world of software development, ensuring the security of your applications is critical. With the rise of containerization, the need for robus...Discusstricks
Cloud Tunedcloudtuned.hashnode.dev·May 18, 2024Exploring OWASP ZAP: Your Ultimate Web Application Security CompanionExploring OWASP ZAP: Your Ultimate Web Application Security Companion OWASP ZAP (Zed Attack Proxy) is a powerful open-source security testing tool designed to help developers and security professionals identify and mitigate security vulnerabilities i...DiscussOWASP ZAP
Cloud Tunedcloudtuned.hashnode.dev·May 17, 2024Understanding Insecure Direct Object References (IDOR)Understanding Insecure Direct Object References (IDOR) Insecure Direct Object References (IDOR) is a common security vulnerability that occurs when an application exposes sensitive data or functionality by directly referencing internal objects or res...DiscussIDOR
Cloud Tunedcloudtuned.hashnode.dev·May 16, 2024Understanding Server-Side Request Forgery (SSRF)Understanding Server-Side Request Forgery (SSRF) Server-Side Request Forgery (SSRF) is a security vulnerability that occurs when an attacker is able to send unauthorized requests from a vulnerable server. This type of attack can lead to data leaks, s...Discussssrf
Jubril Edunjubriledun.hashnode.dev·Apr 22, 2024Vulnerability Scanning (nmap, Nessus, Metasploitable 2)In this project, we will be practicising vulnerability management by scanning a vulnerable virtual machine (Metasploitable 2) using scanning tools (nmap and Nessus) Vulnerability Management is the process of identifying security flaws and vulnerabili...Discuss·204 readsnessus
Muhdsodiq Bolarinwaamityclev.hashnode.dev·Jan 12, 2024Common Security Vulnerabilities in Blockchain Systems and Strategies To Mitigate Them.Blockchain is a decentralized ecosystem, which is built to secure vital information. With the security of blockchain, there are still some security vulnerabilities that people are still building solutions on. These security vulnerabilities are weakne...Discussvulnerabilities
mauvehedrant.mvh.dev·Aug 28, 2023Ubuntu rates a CRITICAL vulnerability as LOW?!Ubuntu recently classified a 9.8 CVSS rated vulnerability as "low priority". The first question would seemingly be, how could something so clearly identified as critical be reclassified to nothing? Well, that's an easy answer. Because that's the whol...Discuss·1 like·28 readsVulnerability ManagementSecurity