hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Empower Your Defense: Mastering EDR Security for Endpoint Protection
Medium
Empower Your Defense: Mastering EDR Security for Endpoint Protection
“Empower Your Defense: Mastering EDR Security for Endpoint Protection” is published by SimeonOnSecurity.
hack and bug bounty
Empower Your Defense: Exploring EDR Cyber Security Solutions
Medium
Empower Your Defense: Exploring EDR Cyber Security Solutions
“Empower Your Defense: Exploring EDR Cyber Security Solutions” is published by SimeonOnSecurity.
hack and bug bounty
Building a Resilient SOC: Proactive Cybersecurity for Modern Threats
Medium
Building a Resilient SOC: Proactive Cybersecurity for Modern Threats
“Building a Resilient SOC: Proactive Cybersecurity for Modern Threats” is published by SimeonOnSecurity.
hack and bug bounty
Application Security: SQL Injection Vulnerability Allowing Retrieval Of Hidden Data
Medium
Application Security: SQL Injection Vulnerability Allowing Retrieval Of Hidden Data
Embarking on my journey of practical, hands-on learning has always been my preferred approach to gaining new knowledge. Today marked an…
hack and bug bounty
Design Flaws in Authentication in Web Applications Pentesting — 16 | 2023
Medium
Design Flaws in Authentication in Web Applications Pentesting — 16 | 2023
Understanding Critical Vulnerabilities and Mitigation Strategies for Secure Authentication | Karthikeyan Nagaraj
hack and bug bounty
Secure Or Recover Your Digital World: Hire an Ethical Hacker
Medium
Secure Or Recover Your Digital World: Hire an Ethical Hacker
hack and bug bounty
Secrets Detection, the AppSec tool chain must have
Medium
Secrets Detection, the AppSec tool chain must have
Secrets detection is an important part of application security because it helps to prevent unauthorised access and modifications to…
hack and bug bounty
PostMessage API
Medium
PostMessage API
Introduction to PostMessage API:
hack and bug bounty
Top 9 Types of Malware You Should Know About!
Medium
Top 9 Types of Malware You Should Know About!
🚨
💻
🔒
Today, I want to share with you the top 9 types of malware that pose threats to our digital safety.
🔐
Adware
📺
: This type of malware bombards you with unwanted ads, often in the form of pop-ups…
hack and bug bounty
How Search Engines Work : A Must-Know for IT Professionals
Medium
How Search Engines Work : A Must-Know for IT Professionals
Here’s the high-level gist of what goes on when you type something in your favorite search bar and hit ‘Enter’ on your keyboard.
🖥️
hack and bug bounty
HTTP methods, there are actually 39!
Medium
HTTP methods, there are actually 39!
Did you know? Even though people usually use 4–5 HTTP methods, there are actually 39!
hack and bug bounty
Secure your API with these 16 Practices
Medium
Secure your API with these 16 Practices
1. Authentication
🕵️♀️
— Verifies the identity of users accessing APIs.
2. Authorization
🚦
— Determines permissions of authenticated…
hack and bug bounty
Story Of Pre-Account Takeover via 0auth Misconfiguration
Medium
Story Of Pre-Account Takeover via 0auth Misconfiguration
Hello guys,
hack and bug bounty
Windows Security — SID (Security Identifier)
Medium
Windows Security — SID (Security Identifier)
The goal of an SID is to uniquely identify a security principal/group. When talking about a security principal we mean any entity that can…
hack and bug bounty
The OSI Model is a must in 2023
Medium
The OSI Model is a must in 2023
Knowing the OSI Model is no longer only for networking folks. In today’s interconnected world, it’s becoming essential knowledge for…
hack and bug bounty
Learn Cybersecurity with Minecraft and Docker: Part 1
Medium
Learn Cybersecurity with Minecraft and Docker: Part 1
“Imagination is the only weapon in the war with reality.”
hack and bug bounty
How to spoof your GPS to hide your location
Medium
How to spoof your GPS to hide your location
As you already know, it is possible to spoof both your IP address and MAC address. You can even spoof your global position (GPS). This is…
hack and bug bounty
Crack WPS Pin with Bully
Medium
Crack WPS Pin with Bully
Like all things in life, there are many ways to do a hack. In fact, good hackers usually have many tricks up their sleeve to break into a…
hack and bug bounty
How advertisers are tracking you and what you can do about it
Medium
How advertisers are tracking you and what you can do about it
There are a number of ways that advertisers can track you across the web. Advertisers cast a wide net and use many different techniques at…
hack and bug bounty
The basic features of cryptography
Medium
The basic features of cryptography
As hackers, we often face the hurdle of cryptography and encryption. Every security engineer understands that encryption makes an attacker’s job much more difficult. In some cases it can be useful to…
hack and bug bounty
What is a Brute Force attack and how to protect yourself
Medium
What is a Brute Force attack and how to protect yourself
There are many ways that hackers use to get into a computer, computer network, website, or online service.