Articles by Tag #cybersecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

How to Track USDT TRC20 Transactions

Tether USDT (TRC20) is a USDT stablecoin issued on the TRON network using the trc20 token standard....

Learn More 311 23Jul 1 '24

TryHackMe | Search Skills | RSCyberTech

➡️ By @RSCyberTech Website: RSCyberTech.com LinkedIn: linkedin.com/in/ricardoams Platform:...

Learn More 117 0Nov 2 '24

How to Get Started with Bash Scripting for Automation

One of the most powerful tools for automation is Bash scripting. Whether you're a beginner or a...

Learn More 116 10Jan 12

How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

Kali metapackages; install all the tools you want with a simple Command' Did you just...

Learn More 109 4Sep 7 '24

The Beginner's Guide to Understanding WebSocket

About the Author I'm Carrie, a cybersecurity engineer and writer, working for SafeLine...

Learn More 100 10Nov 5 '24

Exploits Ep - 1: From Prototype Pollution to a 100% Discount

Imagine this: You're browsing your favourite online shop, adding those must-have items to your cart,...

Learn More 72 13Aug 3 '24

I Built an Nmap GUI Client Using Tkinter to Simplify Network Scanning for You

abubakerx1da49 / Nmap-GUI-Client-using-Tkinter ...

Learn More 65 0Feb 19

Why I Quit Development to Break Into Cybersecurity

I started at the terminal with my fingers frozen, time ticking–tic-tic-tic–less than 5 minutes left...

Learn More 61 14Jun 15

Cybersecurity Beginner's Guide: Build Your Own Vulnerable Lab in 5 Minutes (DVWA + More)

In cybersecurity learning and hands-on training, a cyber range is a must-have environment. It...

Learn More 55 5Apr 17

Exploits Ep-2: Exploiting XSS to Become Someone Else Online

Disclaimer: The techniques described in this blog are for educational purposes only. We're here to...

Learn More 50 6Aug 27 '24

Using LLMs For Kubernetes: Enter k8sgpt

GenAI and LLMs are a big “buzz” right now, but there’s some “good” behind it - automation. In an...

Learn More 46 0Aug 5 '24

Common Ports and Protocols

Common Ports and Protocols: The Backbone of Network Communication Understanding how data...

Learn More 44 2Aug 1 '24

Explorando abordagens de análise na Engenharia reversa:

A Engenharia reversa é crucial para diversas aplicações, desde a detecção e mitigação de malware até...

Learn More 42 2Jun 28 '24

Artificial Intelligence in Cybersecurity: New Solutions for New Threats

Introduction The rapid development of artificial intelligence is one of the most important...

Learn More 39 11Oct 9 '24

Ashkan Rajaee's Warning: The Remote Hiring Scam No One Talks About (And What You Can Do)

Controversial Take: Remote work is not just the future. It has become the playground of modern...

Learn More 37 31Jun 2

Try Hack Me: Friday Overtime Complete Write-up 👾

In my most recent side-quest in life, I decided to dive back into the world of hAcK1_nG. The last...

Learn More 37 0Jul 26 '24

When Bad Code Crashes a Billion Windows Computers 🚨

Recently, a significant "bad-code attack" affected many organizations due to a problematic update...

Learn More 34 29Jul 21 '24

🚀 Unlocking Fine-Grained Access Control with Cerbos

🌟 In an era where security is paramount, managing user access and permissions effectively is crucial...

Learn More 34 4Nov 26 '24

What You ACTUALLY Need To Know For A Cybersecurity Job

Cybersecurity is arguably the “coolest” IT-style job role in 2024 (others may put cloud-native in...

Learn More 34 4Aug 12 '24

How Does HTTPS Works?

In today's digital age, secure communication over the internet is more crucial than ever. Enter...

Learn More 34 13Jul 30 '24

Flipper Zero NFC Hacking - EMV Banking, Man-in-the-Middle, and Relay Attacks

In our previous post, we explored how the Flipper can function as both an NFC contactless card reader...

Learn More 27 2Dec 12 '24

How to Transition from IT Support to Cybersecurity: A Complete Career Guide

Cybersecurity is the new rave, probably even a bigger rave than devops. I believe that cybersecurity...

Learn More 26 6Feb 27

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

Online Installation (Recommended!!!) If your server has internet access, we recommend this...

Learn More 25 0Oct 9 '24

My CloudSEK Internship Experience

This article is about my internship at CloudSEK. CloudSEK is a cybersecurity company that uses...

Learn More 25 4Nov 11 '24

The Ghibli Trend: How to Make Your Own AI-Generated Ghibli Art 🎨🤖

Unless you've been living under a digital rock, you've probably seen the latest Instagram craze:...

Learn More 25 1Mar 31

Deep Dive into Essential Directories

/bin — The Command Center/bin — The Command Center The /bin directory is the command center of your...

Learn More 24 8Jul 29 '24

Crowdstrike: Who is getting fired?

The entire world, or most of it, was in crisis mode for the last 24 or 48 hours, depending on your...

Learn More 24 18Jul 21 '24

Intro to Application Security

In the face of increasing cyberattacks, application security is becoming critical, requiring...

Learn More 24 6Jul 1 '24

Revolutionize Security with Our Next-Gen Face Recognition API

Revolutionize Security with Our Next-Gen Face Recognition API The face recognition API has become...

Learn More 24 0Oct 11 '24

Reverse engineering TP-Link Tapo's REST API - part 1

Target overview Ecosystem of TP-Link Tapo consists of: Client - Tapo mobile...

Learn More 23 5Oct 9 '24