Best of CybersecurityAugust 2024

  1. 1
    Video
    Avatar of an0n_aliAn0n Ali·2y

    20 Browser Extensions for HACKERS & OSINT!

  2. 2
    Article
    Avatar of netguruNetguru·2y

    15 Critical Security Tips for Web Development in 2023

    The rising importance of cybersecurity due to increasing cyber threats makes web application security indispensable. Key security measures include implementing web application firewalls, multi-factor authentication, conducting security assessments, and regular software updates. Understanding and differentiating between external and internal web security are crucial. Emphasizing enterprise security planning can mitigate potential breaches, and employing best practices like encryption, logging, and employee education enhances security. Monitoring for anomalies and conducting security audits are also essential for safeguarding web applications.

  3. 3
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·2y

    Cracking Windows 10 hashes

    Learn how to dump and crack Windows 10 hashes using Mimikatz and Hashcat. The guide includes disabling Windows Defender, downloading Mimikatz, running commands to escalate privileges, and using Hashcat with a word list to crack the retrieved NTLM hashes.

  4. 4
    Article
    Avatar of systemweaknessSystem Weakness·2y

    Finding origin ip address

    The post provides various methods and tools to find the origin IP address of websites hidden behind Web Application Firewalls (WAF) like Cloudflare. It suggests manual techniques using platforms such as Shodan and DNS lookup tools, and also lists automation tools available on GitHub for the same purpose.

  5. 5
    Article
    Avatar of systemweaknessSystem Weakness·2y

    Advanced Kali Linux Commands for Hacking and Penetration Testing

    This post highlights advanced Kali Linux commands crucial for penetration testers. It covers powerful tools like Nmap for network scanning, Metasploit Framework for exploitation, Aircrack-ng for wireless network cracking, Netcat for versatile networking tasks, Burp Suite for web application testing, and John the Ripper for password cracking. Each section includes advanced usage examples and explanations of specific commands.

  6. 6
    Video
    Avatar of davidbombalDavid Bombal·2y

    Reverse Engineering 101 tutorial with the amazing Stephen Sims!

  7. 7
    Article
    Avatar of communityCommunity Picks·2y

    How to Integrate Passkeys in Python (FastAPI)

    Learn to integrate passkey authentication in a Python web application using FastAPI with Corbado's passkey-first web-js package. This guide covers setting up project structure, configuring environment variables, and creating HTML templates for seamless session management and user authentication.

  8. 8
    Article
    Avatar of communityCommunity Picks·2y

    Password Complexity, Hash Iterations and Entropy

    Neon is exploring whether it's feasible to reduce SCRAM password hashing iterations from 4096 to one, aiming to enhance CPU efficiency without compromising security. By increasing password length, they can maintain security levels despite fewer iterations, due to random password generation mitigating dictionary attacks. Their approach balances security with performance, asserting that longer passwords can effectively replace higher iteration counts.

  9. 9
    Video
    Avatar of christianlempaChristian Lempa·2y

    Secure your HomeLab for FREE // Wazuh

    Christian introduces Wazuh, an open-source security platform that integrates extended detection and response (XDR) and security information and event management (SIEM) to offer comprehensive protection for home labs. He explains how to set it up on virtual servers, including connecting different devices, providing a detailed walkthrough of its features like configuration assessment, malware detection, and threat intelligence. The platform is ideal for anyone looking to enhance their cybersecurity knowledge or secure their IT infrastructure for free.

  10. 10
    Article
    Avatar of strongdmstrongdm·2y

    5 Types of Multi-Factor Authentication (MFA) Explained

    Multi-factor authentication (MFA) is a critical tactic to reduce the likelihood of compromised user credentials, essential for enhancing enterprise security. It combines criteria like passwords, devices, biometrics, and more to verify user identity, making it harder for attackers to breach systems. The five common types of MFA are SMS/Email, authenticators, biometrics, security keys, and digital certificates. Each method has its pros, cons, and suitable use cases, impacting security levels, user experience, implementation complexity, and costs. It's vital to choose an MFA method aligning with your organization's security requirements and industry standards.

  11. 11
    Video
    Avatar of davidbombalDavid Bombal·2y

    Is this the future of WiFi?

  12. 12
    Article
    Avatar of systemweaknessSystem Weakness·2y

    SQL Injection Attacks and How to prevent them

    SQL Injection is a critical security attack that exploits vulnerabilities in web applications by injecting malicious SQL queries. This can compromise sensitive information, result in data loss, or affect the application's behavior. Common causes of SQL injection vulnerabilities include lack of data validation, complicated queries, and inefficient error handling. There are multiple types of SQL Injections, such as in-band, blind, out-of-band, and stored procedure injections. Preventive measures include using prepared statements, validating and sanitizing user inputs, limiting database permissions, and deploying Web Application Firewalls.

  13. 13
    Article
    Avatar of communityCommunity Picks·2y

    RFID cards could turn into a global security mess after discovery of hardware backdoor

    Security researchers have uncovered hardware backdoors in Chinese-made RFID chips used in widely deployed contactless cards, including office access and hotel room keys. These backdoors, found in FM11RF08S and FM11RF08 chips, allow for quick cloning and unauthorized access. Despite countermeasures in newer versions, these cards remain vulnerable. Alternative, more secure RFID technologies are available.

  14. 14
    Article
    Avatar of kdnuggetsKDnuggets·2y

    Generative AI Specialisation Courses from IBM for Every Profession

    IBM offers five specialisation courses aimed at professionals who want to upskill with generative AI. The courses are tailored for data analysts, cybersecurity professionals, data engineers, software developers, and product managers. Each course covers the basics of generative AI, its models and tools, and specific applications within each profession. The goal is to help professionals leverage generative AI in their workflows and stay relevant in their fields.

  15. 15
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·2y

    Level Up Your Linux-Fu: Essential Linux Skills For Cybersecurity Newbies

    Mastering Linux is essential for aspiring cybersecurity professionals. This post covers practical steps to boost your command line, scripting, and automation skills. Key areas include understanding fundamental Linux commands, choosing security-focused distributions like Kali Linux or Parrot Security OS, and learning core security tools such as Nmap, Metasploit, and Wireshark. Additionally, scripting in Bash and Python for automation is crucial, along with customizable shell environments like Zsh. Recommended resources are provided for continuous learning and practice.

  16. 16
    Article
    Avatar of thevergeThe Verge·2y

    MrBeast blames terrible Beast Games conditions on the CrowdStrike outage

    The CrowdStrike global IT outage has been blamed for poor conditions at MrBeast's Beast Games reality show, affecting 2,000 contestants with issues like lack of food, medication, and clean underwear. Despite the hardships, MrBeast has not apologized, instead attributing the issues to external factors including the outage, extreme weather, and logistical problems. This follows a pattern seen in other events with similar logistical failures.

  17. 17
    Article
    Avatar of communityCommunity Picks·2y

    How SSH Secures Your Connection

    SSH, or Secure Shell, provides secure remote access to UNIX-like servers by ensuring confidentiality, integrity, and availability through encryption, authentication, and protection against various attacks. It uses asymmetric and symmetric encryption, Diffie-Hellman key exchange, and Message Authentication Codes (MAC) for robust security. The post also explores ways to prevent tampering and downgrade attacks while discussing methods for secure user authentication.

  18. 18
    Video
    Avatar of seytonicSeytonic·2y

    1 Million Domains Could Be Stolen with a Sitting Duck Attack

  19. 19
    Article
    Avatar of hnHacker News·2y

    Windows 0-day was exploited by North Korea to install advanced rootkit

    A recent Windows zero-day vulnerability, CVE-2024-38193, exploited by North Korean hackers, was used to install advanced rootkit malware. The exploit allowed attackers to gain system privileges, bypass security, and target sensitive sectors such as cryptocurrency and aerospace. The malware, FudModule, is known for its deep integration into the Windows kernel, making it difficult to detect and prevent. Researchers have linked this activity to the Lazarus Group, a notorious hacking organization backed by the North Korean government.

  20. 20
    Article
    Avatar of hnHacker News·2y

    nico’s blog · Job searching in 2024 is horribly broken

    A network engineer with extensive experience finds job searching in 2024 to be inefficient and flawed. Despite having relevant certifications and a myriad of skills, the automated and AI-based hiring processes result in numerous instant rejections, often due to lack of a college degree or security clearance. The author criticizes the requirement for account creation on multiple job sites, the misuse of AI in filtering candidates, and the inaccuracies in job descriptions. Suggestions for improvement include removing the requirement for account creation, refining AI filters to recognize industry experience, and accurately posting job requirements.

  21. 21
    Article
    Avatar of communityCommunity Picks·2y

    AI Agents: 7 Game-Changing Use Cases Transforming Businesses

    AI agents are revolutionizing business operations by offering advanced solutions in customer service, lead generation, recruitment, supply chain management, cybersecurity, financial reporting, and project management. These digital tools are capable of making autonomous decisions, learning from their environment, and continuously improving their performance, thus providing businesses with unprecedented efficiency and strategic advantages.

  22. 22
    Video
    Avatar of davidbombalDavid Bombal·2y

    Is this the best Cybersecurity beginner cert? (Includes Giveaway!)

  23. 23
    Video
    Avatar of youtubeYouTube·2y

    Cyber Security Full Course for Beginners in 11 Hours - 2024 Edition

    This comprehensive cybersecurity course for beginners covers essential topics and foundational concepts over 11 hours. It's designed to equip newcomers with the knowledge and skills required to understand cybersecurity principles and enter the field confidently.

  24. 24
    Article
    Avatar of communityCommunity Picks·2y

    OpenCTI-Platform/opencti: Open Cyber Threat Intelligence Platform

    OpenCTI is an open-source platform designed to manage cyber threat intelligence. It structures, stores, and visualizes both technical and non-technical information about cyber threats using the STIX2 standards. The platform features a web application, GraphQL API, and integrates with tools like MISP and MITRE ATT&CK. OpenCTI supports importing and exporting data in various formats and offers Community and Enterprise editions, with the latter providing additional features. The platform also collects anonymized usage data to improve performance.

  25. 25
    Article
    Avatar of nordicapisNordic APIs·2y

    Why You Should Hack Your Own APIs

    Hackers often target APIs due to their potential vulnerabilities, bypassing UI protections. By understanding their mindset, developers can proactively secure their APIs. Key insights include recognizing common breach causes like broken authorization and excessive data exposure, and adopting robust security practices such as automation and continuous testing throughout the API lifecycle.