Best of CybersecurityMay 2024

  1. 1
    Article
    Avatar of javarevisitedJavarevisited·2y

    6 Best Cybersecurity Courses for Beginners and Experienced in 2024

    Discover the best cybersecurity courses on Udemy for beginners and experienced individuals in 2024. These courses cover topics like cyber security, ethical hacking, network security, and information security.

  2. 2
    Article
    Avatar of itsfossIt's Foss·2y

    6 Linux Commands I Use for Malware Analysis

    Learn about six Linux commands that are useful for malware analysis, including strings, file, xxd, objdump, nm, and gdb.

  3. 3
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·2y

    How I Got My First Bounty: The Exciting Story of My Bug Bounty Breakthrough

    Learn how the author achieved their first bug bounty by discovering a GraphQL API key leak and cache poisoning vulnerability.

  4. 4
    Article
    Avatar of javarevisitedJavarevisited·2y

    The 2024 Cyber Security Analyst RoadMap

    A comprehensive roadmap to becoming a Cyber Security Analyst in 2024. Covers key skills, tools, and knowledge areas. Recommended courses for learning Python, computer networking, and cloud security.

  5. 5
    Article
    Avatar of communityCommunity Picks·2y

    LLM Agents can Autonomously Hack Websites

    LLM agents have been shown to autonomously hack websites, raising questions about their potential for dual use. This post explores the capabilities of LLM agents, their ability to perform complex hacks, and the implications of their deployment.

  6. 6
    Article
    Avatar of communityCommunity Picks·2y

    Ranked: The Top Startup Cities Around the World

    The post provides information on the top startup cities around the world and the most common cybersecurity mistakes in 2023.

  7. 7
    Video
    Avatar of davidbombalDavid Bombal·2y

    Hacking Wordpress Websites with Python (using Dark Web and Telegram data)

    Learn how to hack WordPress websites using Python and leaked credentials from the dark web. Find out how to protect your passwords and why using a password manager and two-factor authentication is important.

  8. 8
    Article
    Avatar of infoworldInfoWorld·2y

    10 big devops mistakes and how to avoid them

    Devops continues to grow in popularity as organizations look for ways to add efficiencies to the development process. Certain mistakes can sabotage development efforts if not addressed, such as lack of communication between dev and ops teams, overlooking cybersecurity, complex IT infrastructure, misalignment of devops priorities with business goals, integration of new technologies without proper evaluation, reliance on outdated technologies, cultural resistance to change, challenges of remote work, divergent goals between dev and ops teams, and the misconception that automation solves everything.

  9. 9
    Article
    Avatar of systemweaknessSystem Weakness·2y

    SQL Injection — A Persistent Threat

    Learn about SQL Injection, a persistent and dangerous cybersecurity threat that continues to be a problem. Discover why it is still a major concern and explore some fixes to protect against it.

  10. 10
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·2y

    The Ultimate Cyber Security Weapon: SharePoint Lists

    Lists play a critical role in cyber security, similar to how data cleansing is important in data science. SharePoint Lists provide a powerful solution for creating and managing these lists in a Microsoft 365 environment.

  11. 11
    Video
    Avatar of seytonicSeytonic·2y

    Disgusting Hacker Gets 6 Years in Prison

    A hacker has been sentenced to 6 years in prison for a cyber attack on a psychotherapy company, major US cell carriers have been fined for selling location data, and researchers are targeting a zombified Chinese botnet.

  12. 12
    Article
    Avatar of embracetheredEmbrace The Red·2y

    Machine Learning Attack Series: Backdooring Keras Models and How to Detect It · Embrace The Red

    This post explores the threat of model deserialization issues in machine learning, specifically backdooring Keras models. It provides a step-by-step guide to detecting and mitigating backdoored model files, and recommends integrating detection tooling into MLOps pipelines.

  13. 13
    Article
    Avatar of embracetheredEmbrace The Red·2y

    ChatGPT: Hacking Memories with Prompt Injection · Embrace The Red

    OpenAI introduces a memory feature in ChatGPT that allows it to recall information across sessions. However, this feature also comes with risks, as it can be manipulated by attackers to store false memories or instructions. Three attack avenues are explored: connected apps, uploaded documents, and browsing. The post provides demonstrations and recommendations to protect interactions with AI.