Shaunak DeshpandeforShades of codeshadesofcode.hashnode.net·Jan 11, 2022The story of Cross Site ScriptingEven with billions of people on the internet, we all understand that growing your following to a million followers on social media is no joke. It takes deliberate effort, consistency, and patience. But what if I told you that someone managed to do th...Chris Benjamin and 3 others are discussing this4 people are discussing thisDiscuss·61 likes·222 readsSecurity
Tabitha WangechiforShe Code Africa Nairobiscanairobi.hashnode.net·Mar 28, 2023Women in Cybersecurity: Overcoming Bias and Advancing in the FieldBy Tabitha Wangechi As technology continues to shape our daily lives, the importance of cybersecurity cannot be overstated. It’s no secret that the female perspective on cybersecurity is the game changer, and having more women on tech and advocacy te...Discuss·23 likes·368 readswomenwhocode
Blessing DuruforKing Muna's blogblessingduru.hashnode.net·Jun 10, 2022Drive-by download attacks and How to prevent them.Did you know that you can be open to cyberattacks or even compromised just by visiting some websites? It happens through an attack called the Drive-by download attack. Now please allow me to enlighten you. A Drive-by download attack is the involuntar...isaiah benson and 7 others are discussing this8 people are discussing thisDiscuss·14 likes·310 reads#cybersecurity
Joshua CrawfordforJoshua Crawford's Development Blogjoshuacrawford.hashnode.net·Apr 17, 2023My First Cyber Security ConferenceLead-Up I've always loved the idea of Cyber Security since I was young and through my research months ago, I learned one primary thing: immersion was key. A few months ago I decided to get serious about creating and pursuing the career I want. Being ...DiscussCyberSec
Lawal Gbolahanforlawalwrites.hashnode.net·Apr 16, 2023Social Engineering: preying on human mindIn today's world, where technology has become an integral part of our lives, the importance of cybersecurity has never been greater. However, as much as we rely on technology to protect us, it's important to remember that humans are still the weakest...Discuss·1 like#cybersecurity
Aryan KoundalforAryan Koundalaryankoundal.hashnode.net·Apr 6, 2023"Cybersecurity Education In a Developing Nation"ABSTRACT The ability to prevent successful cyberattacks against a nation’s critical infrastructure depends on the availability of a skilled cyber-literate workforce, and therefore, on an educational system that can build such capabilities. INTRODUCTI...Discuss#cybersecurity
Tabitha WangechiforShe Code Africa Nairobiscanairobi.hashnode.net·Mar 28, 2023Women in Cybersecurity: Overcoming Bias and Advancing in the FieldBy Tabitha Wangechi As technology continues to shape our daily lives, the importance of cybersecurity cannot be overstated. It’s no secret that the female perspective on cybersecurity is the game changer, and having more women on tech and advocacy te...Discuss·23 likes·368 readswomenwhocode
Nehal IngoleforTeckbaker's Blogteckbakers.hashnode.net·Mar 21, 2023Introduction to CryptographyCryptography is the technique of securing information and communications through the use of codes so that only those persons for whom the information is intended can understand and process it. In Cryptography the techniques which are used to protect ...Discuss·6 likes·69 readsCryptography
Solomon AchugwohforSecuredtipssecuredtips.hashnode.net·Mar 18, 2023OWASP Top 10 Security VulnerabilitiesThe Open Web Application Security Project (OWASP) is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. It’s an international security...Discuss·43 readsOWASP TOP 10
Hashar MujahidforHax-13 Heraldhasharmujahid.hashnode.net·Mar 18, 2023JWT (JSON WEB TOKENS) [Explained | Exploited][Part]Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. In this blog, we are going to learn about what are JWTs (JSON Web Tokens) and how we can exploit them. We will also see some advanced techniques to exploit JWTs. Let...Discuss·1 like·45 reads#cybersecurity
Shubham SareliyaforTech-O-Stackshubhamsareliya.hashnode.net·Mar 15, 2023Botnet Detection: How to Spot and Stop the Invisible ArmyBotnets are an invisible threat that can wreak havoc on your computer system, stealing your data, and compromising your security. A botnet is a network of computers that have been infected with malware, allowing an attacker to control them remotely. ...Discuss·29 readsCyberSec
Aman Yadavforitsamanyadav.hashnode.net·Mar 5, 2023Introduction to Cyber Sec for Beginners 2023Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption o...Discuss·129 readsDevsInTechBlogs
Solomon AchugwohforSecuredtipssecuredtips.hashnode.net·Mar 1, 2023Blockchain as a tool in improving CybersecurityThere has been increased concern in the public about cybersecurity breaches, the rising frequency, sophistication, size, and financial repercussions. Both Individuals, government and private organizations are looking for solutions to keep up with the...Discuss·10 likesBlockchain