Kubernetes Cluster – Interactive Architecture Diagram
OWASP TOP 10 – Flashcards. Learn OWASP Top 10 using flashcards
Cybersecurity and ethical hacking terminologies Flashcards
Kubernetes Cluster Setup in Local Machine Using VirtualBox and Ubuntu.
log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
What is log4shell ? “Log4Shell” got its name by researchers at LunaSec and credited to Chen Zhaojun of Alibaba. It is an remote code execution vulnerability. This vulnerability has been found in Apache Log4j library, which is an open source logging utility which is written in Java and developed by Apache Software Foundation. This library is… Read More »log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
In some of the cases you may need to login using the superuser root in Kali Linux. However, by default the root user in Kali Linux is disabled and when you try to login you will get password is incorrect error. In this case, you will have to install a package and make some modifications… Read More »Enabling Root User in Kali Linux
Quickly Find Dom-Based XSS Vulnerabilities with Burp Suite’s Dom Invader.
Nmap Cheatsheet – Network Mapper tool used to scan networks and devices.
Get yourself updated with the latest technology and cybersecurity news and articles.
- Researchers Link Multi-Year Mass Credential Theft Campaign to Chinese…by email@example.com (Ravie Lakshmanan) on August 17, 2022 at 10:59 am
A Chinese state-sponsored threat activity group named RedAlpha has been attributed to a multi-year mass credential theft campaign aimed at global humanitarian, think tank, and government organizations. “In this activity, RedAlpha very likely sought […]
- Lean Security 101: 3 Tips for Building Your Frameworkby firstname.lastname@example.org (The Hacker News) on August 17, 2022 at 10:50 am
Cobalt, Lazarus, MageCart, Evil, Revil — cybercrime syndicates spring up so fast it’s hard to keep track. Until…they infiltrate your system. But you know what’s even more overwhelming than rampant cybercrime? Building your organization’s […]
- Malicious Browser Extensions Targeted Over a Million Users So Far This Yearby email@example.com (Ravie Lakshmanan) on August 17, 2022 at 8:44 am
More than 1.31 million users attempted to install malicious or unwanted web browser extensions at least once, new findings from cybersecurity firm Kaspersky show. “From January 2020 to June 2022, more than 4.3 million unique users were attacked by […]
- North Korea Hackers Spotted Targeting Job Seekers with macOS Malwareby firstname.lastname@example.org (Ravie Lakshmanan) on August 17, 2022 at 6:20 am
The North Korea-backed Lazarus Group has been observed targeting job seekers with malware capable of executing on Apple Macs with Intel and M1 chipsets. Slovak cybersecurity firm ESET linked it to a campaign dubbed “Operation In(ter)ception” that […]