Articles by Tag #cybersecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

How to Track USDT TRC20 Transactions

Tether USDT (TRC20) is a USDT stablecoin issued on the TRON network using the trc20 token standard....

Learn More 300 12Jul 1 '24

How to Get Started with Bash Scripting for Automation

One of the most powerful tools for automation is Bash scripting. Whether you're a beginner or a...

Learn More 115 10Jan 12

The Beginner's Guide to Understanding WebSocket

About the Author I'm Carrie, a cybersecurity engineer and writer, working for SafeLine...

Learn More 100 10Nov 5 '24

How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

Kali metapackages; install all the tools you want with a simple Command' Did you just...

Learn More 96 3Sep 7 '24

TryHackMe | Search Skills | RSCyberTech

➡️ By @RSCyberTech Website: RSCyberTech.com LinkedIn: linkedin.com/in/ricardoams Platform:...

Learn More 90 0Nov 2 '24

Exploits Ep - 1: From Prototype Pollution to a 100% Discount

Imagine this: You're browsing your favourite online shop, adding those must-have items to your cart,...

Learn More 72 13Aug 3 '24

Python Malware: How Cybercriminals Use It in 2025

A Bold New Era of Cyber Threats Cybercrime isn’t what it used to be. In 2025, the code driving...

Learn More 65 3Mar 16

I Built an Nmap GUI Client Using Tkinter to Simplify Network Scanning for You

abubakerx1da49 / Nmap-GUI-Client-using-Tkinter ...

Learn More 65 0Feb 19

Python Keyloggers: Do They Still Work in 2025?

Imagine a tool so stealthy it can quietly monitor every keystroke on your computer without your...

Learn More 62 1Mar 12

Cybersecurity Beginner's Guide: Build Your Own Vulnerable Lab in 5 Minutes (DVWA + More)

In cybersecurity learning and hands-on training, a cyber range is a must-have environment. It...

Learn More 54 4Apr 17

Exploits Ep-2: Exploiting XSS to Become Someone Else Online

Disclaimer: The techniques described in this blog are for educational purposes only. We're here to...

Learn More 50 6Aug 27 '24

Using LLMs For Kubernetes: Enter k8sgpt

GenAI and LLMs are a big “buzz” right now, but there’s some “good” behind it - automation. In an...

Learn More 46 0Aug 5 '24

Common Ports and Protocols

Common Ports and Protocols: The Backbone of Network Communication Understanding how data...

Learn More 44 2Aug 1 '24

Explorando abordagens de análise na Engenharia reversa:

A Engenharia reversa é crucial para diversas aplicações, desde a detecção e mitigação de malware até...

Learn More 41 2Jun 28 '24

Beyond "password123"

Introduction In today's digitalised world, it's more important than ever to create strong...

Learn More 39 3May 7 '24

Artificial Intelligence in Cybersecurity: New Solutions for New Threats

Introduction The rapid development of artificial intelligence is one of the most important...

Learn More 39 11Oct 9 '24

Brute Force Attacks and CAPTCHA

Introduction In an increasingly interconnected world of digitalisation, security and maintenance of...

Learn More 39 1May 3 '24

Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

Introduction The digital world solely relies on authenticity and privacy. We connect with...

Learn More 37 0May 14 '24

When Bad Code Crashes a Billion Windows Computers 🚨

Recently, a significant "bad-code attack" affected many organizations due to a problematic update...

Learn More 34 29Jul 21 '24

How Does HTTPS Works?

In today's digital age, secure communication over the internet is more crucial than ever. Enter...

Learn More 34 13Jul 30 '24

Try Hack Me: Friday Overtime Complete Write-up 👾

In my most recent side-quest in life, I decided to dive back into the world of hAcK1_nG. The last...

Learn More 34 0Jul 26 '24

What You ACTUALLY Need To Know For A Cybersecurity Job

Cybersecurity is arguably the “coolest” IT-style job role in 2024 (others may put cloud-native in...

Learn More 34 4Aug 12 '24

🚀 Unlocking Fine-Grained Access Control with Cerbos

🌟 In an era where security is paramount, managing user access and permissions effectively is crucial...

Learn More 34 4Nov 26 '24

Bug Bounty Hunting 101: An Introduction for Beginners

Introduction Bug bounty hunting, as the name suggests, is an activity where you hunt for...

Learn More 28 1May 29 '24

Enhancing Security with FacePlugin’s ID Card Recognition from 200 countries

Secure identity is essential in a world where connections are becoming more and more intertwined. Not...

Learn More 26 0Jun 18 '24

Social engineering

Social engineering is the art of manipulating people so they give up confidential information. Every...

Learn More 26 0Jun 4 '24

How to Transition from IT Support to Cybersecurity: A Complete Career Guide

Cybersecurity is the new rave, probably even a bigger rave than devops. I believe that cybersecurity...

Learn More 26 6Feb 27

The Ghibli Trend: How to Make Your Own AI-Generated Ghibli Art 🎨🤖

Unless you've been living under a digital rock, you've probably seen the latest Instagram craze:...

Learn More 25 1Mar 31

OWASP® Cornucopia 2.0

I started out as a web designer 16 years ago and my first website got brutally hacked, not...

Learn More 25 1Jun 10 '24

Revolutionize Security with Our Next-Gen Face Recognition API

Revolutionize Security with Our Next-Gen Face Recognition API The face recognition API has become...

Learn More 24 0Oct 11 '24