hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Day 7: Zero-Day Vulnerabilities — How They Are Exploited and Mitigated
Medium
Day 7: Zero-Day Vulnerabilities — How They Are Exploited and Mitigated
Welcome back to my cybersecurity journey, where we delve into the fascinating world of online security. Today, I’ll be discussing a topic…
hack and bug bounty
Cyber Awareness Month: Day 7-Incident response Program in 10 steps
Medium
Cyber Awareness Month: Day 7-Incident response Program in 10 steps
An incidеnt rеsponsе program (IRP) is a sеt of policiеs and procеdurеs that dеfinе how an organization will rеspond to a sеcurity incidеnt…
hack and bug bounty
HTB: Starting Point — Explosion Machine
Medium
HTB: Starting Point — Explosion Machine
Penetration Test Report
hack and bug bounty
Sans Top 25
Medium
Sans Top 25
The SANS Top 25 is an important list put together by the SANS Institute, which is a well-known organization in the world of cybersecurity…
hack and bug bounty
Top 25 Common Software Errors
Medium
Top 25 Common Software Errors
Absolutely, here are comprehensive details and CWE codes for each of the mentioned software errors:
hack and bug bounty
CVE, CWE, and NDE
Medium
CVE, CWE, and NDE
CVE (Common Vulnerabilities and Exposures):
hack and bug bounty
Cyber Awareness Month: Day 8-Cyber Ecosystem
Medium
Cyber Awareness Month: Day 8-Cyber Ecosystem
A cybеr еcosystеm is a complеx and intеrconnеctеd systеm of pеoplе, tеchnologiеs, and procеssеs that intеract to support thе usе and…
hack and bug bounty
Day 8: Supply Chain Attacks — Protecting Your Organization from Third-Party Risks.
Medium
Day 8: Supply Chain Attacks — Protecting Your Organization from Third-Party Risks.
Welcome back to mycybersecurity awareness journey. I am diving into a critical topic, supply chain attacks. In our interconnected world…
hack and bug bounty
> 2
Medium
𝙋𝘼𝙍𝙏 > 2
𝙋𝘼𝙍𝙏 > 2
hack and bug bounty
what is BOUNTY BUG ?
Medium
what is BOUNTY BUG ?
Bug Bounty is a program that allows independent security researchers to report bugs to an organization and receive rewards or compensation.
hack and bug bounty
Elon Musk has to make a decision about the future of Community Notes
Medium
Elon Musk has to make a decision about the future of Community Notes
Community Notes is a feature that allows X users who have generally stuck to the rules, terms of use and privacy policies of what we used…
hack and bug bounty
How to Become a Penetration Tester: Job Description, Salary, and Skills
Medium
How to Become a Penetration Tester: Job Description, Salary, and Skills
In the world of cybersecurity, penetration testers, also known as ethical hackers, play a crucial role in identifying and mitigating…
hack and bug bounty
Unleashing the Power of DIRB: A Comprehensive Guide to the Web Directory Bruteforcing Tool
Medium
Unleashing the Power of DIRB: A Comprehensive Guide to the Web Directory Bruteforcing Tool
Introduction
In the world of web security testing, staying one step ahead of potential threats is crucial. One tool that has proven its…
hack and bug bounty
Vulnerability Assessment and Penetration Testing (VAPT) for Cloud Computing: A Comprehensive Guide
Medium
Vulnerability Assessment and Penetration Testing (VAPT) for Cloud Computing: A Comprehensive Guide
Cloud computing has revolutionized the way businesses operate by offering flexible, scalable, and cost-effective solutions. However, this…
hack and bug bounty
Effortless Docker Image Optimization: 8 Proven Tips for Efficiency
Medium
Effortless Docker Image Optimization: 8 Proven Tips for Efficiency
Docker images play a pivotal role in the containerization process, but their sheer size can significantly impact multiple facets of your application’s lifecycle. These ramifications include…
hack and bug bounty
Day 9: IoT Security — Safeguarding the Internet of Things Devices
Medium
Day 9: IoT Security — Safeguarding the Internet of Things Devices
Welcome back to my 30-day journey of exploring the world of technology and its impact on our lives. Today’s topicaffects many of us, even…
hack and bug bounty
MISP-Malware Information Sharing Platform & Threat Sharing
Medium
MISP-Malware Information Sharing Platform & Threat Sharing
MISP stands for Malware Information Sharing Platform & Threat Sharing.
hack and bug bounty
The Beginner’s Guide to Bug Bounty Hunting for the Learning Path
Medium
The Beginner’s Guide to Bug Bounty Hunting for the Learning Path
Welcome, aspiring bug hunters and cybersecurity enthusiasts! In this article, we’ll explore the exciting world of bug hunting and outline a…
hack and bug bounty
5+All Security Resource Digest for 2023–10–9
Medium
5+All Security Resource Digest for 2023–10–9
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Certainly! Let’s create an interactive social media post that explains what CVE, CWE, and NVD are:
Medium
🌐
Demystifying CVE, CWE, and NVD — Your Guide to Cybersecurity Jargon!
🌐
🌐
Demystifying CVE, CWE, and NVD — Your Guide to Cybersecurity Jargon!
🌐
hack and bug bounty
Ethical Hacking: How It Works
Medium
Ethical Hacking: How It Works
Ethical hacking, also known as white hat hacking, is the process of using hacking techniques to identify and exploit vulnerabilities in a…