I love learning about network security and penetration testing stuff. I do my own exploration at home using tools on kali Linux. But I don’t...
Post Page Advertisement [Top]
What is Bootloader Unlock? Continue reading on Medium » http://dlvr.it/Sy9LlF
I've been working in cybersecurity for about 7 years; before that for about 8 years in other IT positions. I've been trying to kee...
On July 13, 2023, I stumbled upon a security vulnerability in the popular online travel booking platform, Redacted.com. This website is… C...
My company just rolled out netskope. Half of my tools don't work with certificate errors and the other half (even when given the proper ...
CVE-2023–4966, another vulnerability associated with Citrix, presents a significant concern. This sensitive information disclosure… Contin...
Below are some of the stories we’ve been reporting this week on Cyber Security Headlines. If you’d like to watch and participate in a disc...
Welcome to the Bug Bounty series where we explore the exciting world of ethical hacking. Continue reading on Medium » http://dlvr.it/Sy3...
I need the community's help on this one. So a challenge has been thrown at me at work to figure out how we can combine/leverage Fortiana...
Hi guys, Continue reading on Medium » http://dlvr.it/Sy0sBd
Top Threat Intelligence Tools To Bolster Your Cybersecurity EC-Council http://dlvr.it/Sxzwqt
I've recently started diving into reverse engineering, and I've heard a lot of great things about Ghidra. However, I'm a bit ove...
Alright guys, Continue reading on Medium » http://dlvr.it/SxyDMX
This is the problem faced by most bug hunters in the beginning Continue reading on InfoSec Write-ups » http://dlvr.it/SxvZPw
Google cybersecurity experts share tools to improve security KTBS http://dlvr.it/Sxtd8D
Hi for my school i have to make a Cyber security project about upcoming and already existing AI tools, i have already found quite a few good...
How to write great vulnerability reports? If you’re a security consultant, penetration tester or a bug bounty hunter these tips are for… C...
salutare, Pt. comunitatea de cybersec - daca aveti carti paperback de cybersec (e.g. The Web App Hacker's Handbook si seria de hacking...
In recent years, ransomware attacks have emerged as one of the most pervasive and damaging cybersecurity threats. These malicious attacks… ...
They have an appliance that is installed on-premise and subscriptions are for the software and support. Are there similar commercial solutio...
Hi Everyone , Continue reading on Medium » http://dlvr.it/Sxmghb
I’m curious what some of the coolest soar workflows you’ve seen to get ideas of what to do next? I recently completed a workflow that auto...
Aleo hears his community. Continue reading on Medium » http://dlvr.it/SxkqG8
One of the more intriguing and clandestine methods of covert communication is DNS tunneling. This hidden world of DNS tunneling is not… Co...
Open Threat Exchange (OTX) is a powerful platform that leverages the collective knowledge and experience of cybersecurity professionals to… ...
I am a penetration tester. I am putting together a lab at work. I have the open source software down (kali, etc). We also have tools like co...
Welcome to our YouTube video on HBSQLI — Automated Tool For Testing Header Based Blind SQL Injection. In this informative video, we will… ...
I work in an org that primarily uses Windows and MacOS endpoints. The biggest complaint I keep hearing is about how many security tools w...
Introduction: Continue reading on Medium » http://dlvr.it/SxXTzM
This week brought new attacks, tactics and vulnerabilities and I'm here to distill the top 5 developments that should be on your radar. ...
Hello everyone, This is a short article to pinpoint a recent finding I have discovered in many targets. TBH, it’s an easy one that can be… ...
Want to test out Architech’s new features and earn some $ARCH in the process? This program is for you! Continue reading on Medium » http...
Any full fledge researcher in the crowd. I've got 5 years in the cyber game, on top of 7 in the Technical IT, Sys Admin. In my current r...
In the past months, the web3 security space has seen an influx of newcomers. If you’re one of them, and you want to dive into the action… ...
Hello, The company I work for occasionally gets hired to do one-off Social Engineering tests. This is not a Pen test, its a user train...
I work in the incident response/threat hunting world, and a lot of times my team does not have access to the internet to lookup resources an...
Greetings to the vigilant online community, Continue reading on Medium » http://dlvr.it/SxKFGR
1(26M) has been working as a SOC L1 and L2 in indian MNCs from quite some time but want to get into penetration testing. Don't have any ...
One of the most powerful tools in a cybersecurity professional’s arsenal is a network scanner, which can help identify hosts, open ports… ...
Checkout this ai powered ethical hacking tool, it is currently in beta but has some pretty cool features. Some of them are : * Converts n...
Introduction Continue reading on Medium » http://dlvr.it/SxD1d4
A bug bounty program serves as a cybersecurity initiative that aims to reward individuals who discover potential vulnerabilities within a… ...
Hello r/Cybersecurity, I am currently interviewing for a sr. network security analyst position for a small city (CA, USA). I found our dur...
Hello Guys, Continue reading on Medium » http://dlvr.it/Sx7v02
Introduction Continue reading on Medium » http://dlvr.it/Sx65Wm
Hello Folks, Vinay Jagetiya(princej_76) again with another writeup!!! Continue reading on Medium » http://dlvr.it/Sx3cZ9
Hi guys, As part of my transition from what I'm currently doing to the world of SOC, I'm building a SOC home lab. This lab will in...
Critical SQL Injection Vulnerability in Login Page Continue reading on Medium » http://dlvr.it/Sx14Nl
I work at an AI SaaS company and our main value proposition is making distributed knowledge accessible, using AI to save time and streamline...
Greetings, cybersecurity enthusiasts! Myself Gaurav Raj (@thehackersbrain) In our previous article, we delved into the intricacies of CSRF ...
Introduction Continue reading on Medium » http://dlvr.it/Swvvmb
What are some ways for new analysts to learn how to work in security operations? What are some tools, resources, tips, or tricks to understa...
Recreating a bug in software development involves reproducing the issue or error that occurred during the software’s ops. This process… Co...
Hello, At my Job we're Monitoring different Data 3 web applications. So every month we're getting Security Reports from those app...
Hi everyone, I hope you are doing well. It’s been a while since I last published an article about my findings. In this article, I will… Co...