Muhdsodiq Bolarinwaamityclev.hashnode.dev·Jan 12, 2024Common Security Vulnerabilities in Blockchain Systems and Strategies To Mitigate Them.Blockchain is a decentralized ecosystem, which is built to secure vital information. With the security of blockchain, there are still some security vulnerabilities that people are still building solutions on. These security vulnerabilities are weakne...Discussvulnerabilities
mauvehedrant.mvh.dev·Aug 28, 2023Ubuntu rates a CRITICAL vulnerability as LOW?!Ubuntu recently classified a 9.8 CVSS rated vulnerability as "low priority". The first question would seemingly be, how could something so clearly identified as critical be reclassified to nothing? Well, that's an easy answer. Because that's the whol...Discuss·1 likeVulnerability ManagementSecurity
Shan Mukhtarovshan965.hashnode.dev·Jul 22, 2023How To Implement Vulnerability Management ProgramLet's define vulnerability first. What is vulnerability? Well, according to ISO 27001, vulnerability is a weakness of an asset or control that could potentially be exploited by one or more threats. A threat is defined as any potential cause of an unw...Discuss·46 readsSecurity
Vignesh K Bvigneshbalaji.hashnode.dev·Jul 6, 2023Node.js Vulnerability Management: Best Practices for a Secure ApplicationNode.js is a powerful and widely-used JavaScript runtime that has gained immense popularity in the web development community. However, like any software, Node.js is not immune to vulnerabilities that can potentially compromise the security of your ap...Discussvulnerability
Techlatest.nettechlatest.hashnode.dev·Jun 1, 2023ParrotOS vs Kali Linux: A Comprehensive Comparison of Two most widely used Penetration Testing Operating SystemsIntroduction Penetration testing is an essential practice in cybersecurity, enabling professionals to identify vulnerabilities and secure networks against potential attacks. Two prominent operating systems often used for penetration testing are Parro...Discuss·79 readsParrotOS
Green Methodgreenmethod.hashnode.dev·Dec 5, 2022What is Vulnerability Assessment & Penetration TestingVulnerability Assessment and Penetration Testing (VAPT) are essential tools used in the cybersecurity field. While they both serve the same purpose of identifying network vulnerabilities, they are two separate processes. Each process has its strength...Discuss·29 readsvulnerability
The Secure Radiusthesecureradius.hashnode.dev·Nov 24, 2022Types of Vulnerabilities in the Cyber Security WorldHaving an understanding of the various types of vulnerabilities that can be found in the cyber security world can be helpful in protecting your business. There are several types of vulnerabilities including Web attacks, cross-site scripting, SQL inje...Discuss·1 like·61 reads#cybersecurity
ochidnal abingochidnal1203.hashnode.dev·Oct 6, 2022Vulnerability management in 2023: Questions and answersIn this article, I will try to answer several important questions related to identifying, classifying, prioritizing, and eliminating vulnerabilities in a timely manner, as well as how to automate the vulnerability management process. Let me start the...Discuss·39 readsVulnerability management