hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Vulnerability Assessment and Penetration Testing (VAPT) for Cloud Computing: A Comprehensive Guide
Medium
Vulnerability Assessment and Penetration Testing (VAPT) for Cloud Computing: A Comprehensive Guide
Cloud computing has revolutionized the way businesses operate by offering flexible, scalable, and cost-effective solutions. However, this…
hack and bug bounty
Effortless Docker Image Optimization: 8 Proven Tips for Efficiency
Medium
Effortless Docker Image Optimization: 8 Proven Tips for Efficiency
Docker images play a pivotal role in the containerization process, but their sheer size can significantly impact multiple facets of your application’s lifecycle. These ramifications include…
hack and bug bounty
Day 9: IoT Security — Safeguarding the Internet of Things Devices
Medium
Day 9: IoT Security — Safeguarding the Internet of Things Devices
Welcome back to my 30-day journey of exploring the world of technology and its impact on our lives. Today’s topicaffects many of us, even…
hack and bug bounty
MISP-Malware Information Sharing Platform & Threat Sharing
Medium
MISP-Malware Information Sharing Platform & Threat Sharing
MISP stands for Malware Information Sharing Platform & Threat Sharing.
hack and bug bounty
The Beginner’s Guide to Bug Bounty Hunting for the Learning Path
Medium
The Beginner’s Guide to Bug Bounty Hunting for the Learning Path
Welcome, aspiring bug hunters and cybersecurity enthusiasts! In this article, we’ll explore the exciting world of bug hunting and outline a…
hack and bug bounty
5+All Security Resource Digest for 2023–10–9
Medium
5+All Security Resource Digest for 2023–10–9
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Certainly! Let’s create an interactive social media post that explains what CVE, CWE, and NVD are:
Medium
🌐
Demystifying CVE, CWE, and NVD — Your Guide to Cybersecurity Jargon!
🌐
🌐
Demystifying CVE, CWE, and NVD — Your Guide to Cybersecurity Jargon!
🌐
hack and bug bounty
Ethical Hacking: How It Works
Medium
Ethical Hacking: How It Works
Ethical hacking, also known as white hat hacking, is the process of using hacking techniques to identify and exploit vulnerabilities in a…
hack and bug bounty
The SANS TOP 25
Medium
The SANS TOP 25
The SANS TOP 25 is a list of the most dangerous software errors that can lead to serious web security breaches. It is published annually by…
hack and bug bounty
Cybersecurity: The SANS TOP 25 Most Dangerous Software Errors
Medium
Cybersecurity: The SANS TOP 25 Most Dangerous Software Errors
The SANS TOP 25 Most Dangerous Software Errors is a vital resource for the cybersecurity community.
hack and bug bounty
Cyber Briefing: 2023.10.09
Medium
Cyber Briefing: 2023.10.09
👉
What’s happening in cybersecurity today?
hack and bug bounty
Demystifying Cybersecurity: CVE, CWE, and NVD
Medium
Demystifying Cybersecurity: CVE, CWE, and NVD
In today’s digital era, understanding cybersecurity is paramount! Let’s explore three key concepts: CVE (Common Vulnerabilities and…
hack and bug bounty
Ethical Hacking menggunakan Metasploit di Kali Linux
Medium
Ethical Hacking menggunakan Metasploit di Kali Linux
Tujuan dari dibuatnya artikel Ethical Hacking menggunakan Metasploit ini hanya untuk pelajaran supaya kita semua dapat lebih berhati-hati…
hack and bug bounty
Best Ways to Find XSS in Web App Penetration Testing
Medium
Best Ways to Find XSS in Web App Penetration Testing
Uncovering Cross-Site Scripting Vulnerabilities for Robust Security
hack and bug bounty
Uncovering Security Vulnerabilities: A Deep Dive into an Eye-Opening Git Discovery
Medium
Uncovering Security Vulnerabilities: A Deep Dive into an Eye-Opening Git Discovery
Introduction
hack and bug bounty
Understanding CVE, CWE, and NVD: Protecting the Digital World
Medium
Understanding CVE, CWE, and NVD: Protecting the Digital World
In the ever-evolving landscape of cybersecurity, staying informed about vulnerabilities and threats is crucial. Three key acronyms often…
hack and bug bounty
SANS TOP 25 THREATS
Medium
SANS TOP 25 THREATS
Here is the CWE Top 25 Most Dangerous Software Weaknesses :
hack and bug bounty
Perfect Loader Implementations
Medium
Perfect Loader Implementations
Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and editing! Crossposted on GitHub.
hack and bug bounty
Cybersecurity: Protecting Against 99% of Attacks — Insights from Microsoft’s 2023 Security Report
Medium
Cybersecurity: Protecting Against 99% of Attacks — Insights from Microsoft’s 2023 Security Report
In today’s ever-evolving digital landscape, cybersecurity stands as a paramount challenge. As technology leaders, it is our responsibility…
hack and bug bounty
A list of SANS TOP 25
Medium
A list of SANS TOP 25
🔍
Are you familiar with the SANS TOP 25? It’s a list of the most dangerous software vulnerabilities that can be exploited by attackers…