InInfoSec Write-upsbyAnbu Hack OpsIntroduction to OpenVAS — A Vulnerability ScannerKali Linux provides a tool named the Open Vulnerability Assessment System (OpenVAS) for vulnerability scanning of the system on a network…Aug 28, 2023Aug 28, 2023
InCibersecurity, Malware and Secure DevelopmentbyFernando Muinos2.- Dinamic application security testing (DAST) con ZAPUsando OWASP ZAP para comprobar las vulnerabilidades de la app.Oct 31, 2023Oct 31, 2023
Tarik YegenDefectDojo for DevSecOpsWhen we automate the security scanning of an application, the security tools we use can provide us with different findings. Therefore, for…Jan 31, 2024Jan 31, 2024
jagadeeshTryhackme:Memory ForensicsPerform memory forensics to find the flagsApr 9, 20211Apr 9, 20211
jagadeeshTryhackme:How websites workTo exploit a website, you first need to know how they are created.Mar 31, 2021Mar 31, 2021
Anirudh MRole of software in supply chain managementWhat is the role of software in supply chain management ?In today’s interconnected world, efficient supply chain management is the backbone of any successful business. And software plays a…Feb 2, 20241Feb 2, 20241
Afdul RohmatImplementation of JWT in Spring Boot 3 using Spring SecurityMaster Spring Security with step-by-step guide to building a secure API using JWT authentication and role-based access control.Jan 9Jan 9
InOSINT TeambyCybersec with HemmarsMy Virtual HomeLab: Firewall and GatewayNetwork Segmentation, Configuring VLANs and pfSense Installation and SetupFeb 28Feb 28
Christina LekatiFrom Sock Puppets to Puppet MastersCreating honeypot sock puppet accountsFeb 13, 2021Feb 13, 2021
Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…Mar 6, 20245Mar 6, 20245
InLyft EngineeringbyAlex ChantavyVulnerability Management at Lyft: Enforcing the Cascade [Part 1]Nov 17, 20227Nov 17, 20227
Z3pH7How to Install and Uninstall OpenVAS completely — Kali linuxOpenVAS, an application used to scan endpoints and web applications to identify and detect vulnerabilities. It is commonly used by…Sep 18, 2024Sep 18, 2024
InDev GeniusbyKostiantyn IllienkoDependency-Track: First Steps into SBOM Analysis and Vulnerability ManagementIn today’s complex software landscape, understanding and managing software dependencies is critical to ensuring the security and…Oct 13, 2024Oct 13, 2024
InNEW IT EngineeringbyGosha KhromovGoodbye, Manual RBAC Management in Argo CDManaging Argo CD’s RBAC with K8s Controller and CRDsMar 33Mar 33
InPython in Plain EnglishbyKatoria HenryDocker Multi-Stage FastAPI TutorialDocker has revolutionized the way developers build, ship, and run applications, making containerization a core part of modern DevOps…Feb 25Feb 25
Abheepsa PattnaikHow to manage Vulnerabilities in Software Development lifecycle?Before we dive into how to tackle and manage vulnerabilities, lets understand what is vulnerability.Feb 28Feb 28
cyber_pixDependency Management and SecurityThe Role of Libraries and Packages in Code SecurityJul 31, 2024Jul 31, 2024
Vishal GargHistory and Evolution of Software Supply Chain AttacksAn exploration of software supply chain threats evolving from initial experiments to sophisticated nation state and APT attacks.Aug 8, 2023Aug 8, 2023