Efficient Techniques for Investigating Confidential Files and Documents Continue reading on OSINT TEAM » http://dlvr.it/SzV8YQ
Post Page Advertisement [Top]
Hi everyone, I work in a SOC and sometimes we need to check reputation/information on IPv6 addresses. It's not common but it happens o...
Hello, I’m Bijoy B, an enthusiastic cybersecurity researcher affiliated with RedTeam Hacker Academy. I take pride in being the youngest… C...
An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE) functionality to rope routers and vid...
In my previous blog post, HackTheBox — Web Attacks: From XXE Injection to Local File Disclosure, I went over how to use XXE Injection to… ...
Free cybersecurity tools from pCloud help protect you from hacks 9to5Mac http://dlvr.it/SzMzZB
I’m a SOC Analyst in a mostly Windows environment. Most of what I have done so far with scripting involves gathering information on assets o...
Hi, I am a junior cyber security engineer. I have 1 year experience working as an intern. And have been working officially for 3 months now ...
Continue reading on Medium » http://dlvr.it/SzJyPl
I’ve seen multiple posts on this reddit thread asking about free tools. Those who don’t know CISA has a comprehensive list of free and recom...
Continue reading on Medium » http://dlvr.it/SzHBDx
Welcome to Day 18. Continue reading on Medium » http://dlvr.it/SzDsM1
In recent years, the cybersecurity landscape has seen a remarkable evolution, with bug bounty hunting emerging as a viable full-time… Cont...
I am seeking insights into how organizations manage administrative access for employees on their workstations. Specifically, I am interested...
Before we delve into the intriguing universe of Metasploit, it is crucial to emphasize the need to use these tools in an ethical and legal… ...
The 10 Hottest Cybersecurity Tools And Products Of 2023 CRN http://dlvr.it/Sz6zX3
Hello all, I am an L1 soc analyst with over 3 years of experience. I primarily work on IAM (Account, app provision) on prem AD and Okta. I...
Welcome to Day 15. Continue reading on Medium » http://dlvr.it/Sz5VdJ
Hi, I’ve been a general data scientist for almost 7 years and for along time, my interest has been in cybersecurity but more specifically ...
Indicators of Compromise (IoCs) play a pivotal role in this process by serving as breadcrumbs left behind by malicious actors. Continue re...
For a part time job in cyber security, I recently took a test for the second round of interviews. These questions involved giving us securit...
Welcome to Day 13. Continue reading on Medium » http://dlvr.it/Sz1MJW
Greetings r/cybersecurity, Our security team started a new series of blogs called ransomware diaries which is focusing on similarities and...
WEB SECURITY ACADEMY LAB Continue reading on Medium » http://dlvr.it/SyzY6h
Hello everyone, in this article, I will share how I scaled from a self-redirect that redirected only to a link containing the host itself… ...
I'm a soc analyst and I've been tasked with reporting on the alerts our soc team is receiving. Our infosec team has an app called...
Have you ever heard of the Google Issue Tracker? Probably not, unless you’re a Google employee or a developer who recently reported bugs… ...
I have been working with Python a lot more at work and I wanted to know what people in use it for? I just use it currently to do some data...
Welcome to Day 9. Continue reading on Medium » http://dlvr.it/Syr85q
UK cybersecurity center says 'deepfakes' and other AI tools pose a threat to the next election ABC News http://dlvr.it/Syq7nr
Hello everyone! I've got a question, but first I'll start off with some backround so it'll give context. I work as an help...
Welcome to Day 8. Continue reading on Medium » http://dlvr.it/SynhLQ
How do you test web application "file upload" feature that would: also take random input and tail logs (or exception or exit cod...
Welcome to Day 7. Continue reading on Medium » http://dlvr.it/SylLGl
Good day, I would like some advice from the community please. I have the job title of Cyber Security Analyst. I have been in the role for ...
No, it’s not about testing writing pens/pencils. It’s harder than that. Continue reading on Medium » http://dlvr.it/SyjgRr
So I just want to know far as leveling in the private sector, where can my skills as an ISSO/Tools SME take me. Currently have 6 years of vu...
Swisstronik: Continue reading on Medium » http://dlvr.it/SygtkC
Greetings, Welcome to Day 4. Continue reading on Medium » http://dlvr.it/SydNnH
Hi guys I am tasked with coming up with a structured way to manage and secure access to critical social media accounts (FB, IG, X and a fe...
Greetings, Welcome to Day 3. Continue reading on Medium » http://dlvr.it/SyZmm2
With ChatGPT's unveiling almost a year ago and their dev day yesterday, it's been a sizable amount of time that the generative AI pr...
Greetings, welcome to Day 2. Continue reading on Medium » http://dlvr.it/SyX7xv
I’m looking to implement Just In Time access to all our critical customer data applications and other resources that are more on the sensiti...
Continue reading on Medium » http://dlvr.it/SyTVSQ
From months I have been going through a lot of tools * Configuration/Mis Config Management tools for cloud - Internal Issues at high lev...
Greetings, my name is Wallotry. That’s my hacker name, of course. Continue reading on Medium » http://dlvr.it/SyQvpn
In the name of God Continue reading on InfoSec Write-ups » http://dlvr.it/SyMHrH
Hey! I'm 17 and starting to get into cybersecurity and have been working on some small projects. I've made malicious USBs using Di...
Hi everyone, today we’ll look at one of the external penetration tests that I carried out. The vulnerability has already been patched… Con...
Does anybody have a good, comprehensive definition of a “production” system? The IT leaders in our organization have unofficially limited it...
Are you a bug bounty hunter on a mission to uncover vulnerabilities and secrets hidden within Amazon Web Services (AWS)? In the world of… ...
I understand that random unexperienced coder will not write high quality code but what I mean are professional teams of coders with very wel...
Innocent legacy token used in one of the signup forms may wreak havoc when it’s not being properly managed. Continue reading on Medium » ...