π How hackers think? Inculcating the adversarial mindset
π https://hacklido.com/blog/760-how-hackers-think-inculcating-the-adversarial-mindset
π https://hacklido.com/blog/760-how-hackers-think-inculcating-the-adversarial-mindset
HACKLIDO
How hackers think? Inculcating the adversarial mindset
An interesting dissertation I recently read a dissertation titled βHow Hackers Think: A Mixed Method Study of Mental Models and Cognitive Patterns of High-Te...
π4
π Complete Roadmap for Cyber Security Career Path
π https://hacklido.com/blog/761-complete-roadmap-for-cyber-security-career-path
π https://hacklido.com/blog/761-complete-roadmap-for-cyber-security-career-path
HACKLIDO
Complete Roadmap for Cyber Security Career Path
Below are some basic requirements and steps to become a cyber security expert: Step 1: Education Requirements Firstly, you must fulfil the basic educatio...
π2β€1
π A Quick Look At The NCSC GuideLines For AI Security
π https://hacklido.com/blog/759-a-quick-look-at-the-ncsc-guidelines-for-ai-security
π https://hacklido.com/blog/759-a-quick-look-at-the-ncsc-guidelines-for-ai-security
HACKLIDO
A Quick Look At The NCSC GuideLines For AI Security
On 27 November 2023, the UKβs National Cyber Security Centre (NCSC) released its new global guidelines for AI security. The Guidelines for Secure AI Syst...
π3
π A Rise In Maritime Cyber Threats( And One New Solution)
π https://hacklido.com/blog/762-a-rise-in-maritime-cyber-threats-and-one-new-solution
π https://hacklido.com/blog/762-a-rise-in-maritime-cyber-threats-and-one-new-solution
HACKLIDO
A Rise In Maritime Cyber Threats( And One New Solution)
Rapid digital transformation and changing regulatory requirements mean that cybersecurity is increasingly important for the maritime industry. Companies...
π1
π How to start Bug Bounty Hunting $$$$ in 2024??
π https://hacklido.com/blog/786-how-to-start-bug-bounty-hunting-in-2024
π https://hacklido.com/blog/786-how-to-start-bug-bounty-hunting-in-2024
HACKLIDO
How to start Bug Bounty Hunting $$$$ in 2024??
TL;DR: This guide is tailored for complete beginners. Learn how to hunt down digital bugs, improve cybersecurity skills, and earn $$$$$ along the way! The...
π2
π How to Crack an Entry Level Job in Cybersecurity! - 2024
π https://hacklido.com/blog/788-how-to-crack-an-entry-level-job-in-cybersecurity-2024
π https://hacklido.com/blog/788-how-to-crack-an-entry-level-job-in-cybersecurity-2024
HACKLIDO
How to Crack an Entry Level Job in Cybersecurity! - 2024
Follow these steps & kick-start your career in cyber-security! Learn Computer Network Fundamentals: A strong understanding of networking basics is c...
π2
π Launching A Cybersecurity Startup? Do This
π https://hacklido.com/blog/791-launching-a-cybersecurity-startup-do-this
π https://hacklido.com/blog/791-launching-a-cybersecurity-startup-do-this
HACKLIDO
Launching A Cybersecurity Startup? Do This
Weβre focused onβ¦ How to build a high-performing team for your startup. Why? Because at #BHMEA22, Mohammed Almeshekah (Founder and Managing Partner at...
π6β€2π₯1
π Cat, Mouse, And Endless Curiosity
π https://hacklido.com/blog/797-cat-mouse-and-endless-curiosity
π https://hacklido.com/blog/797-cat-mouse-and-endless-curiosity
HACKLIDO
Cat, Mouse, And Endless Curiosity
Dr. Srijith Nair (CISO at Careem) has a broad range of experience in the cybersecurity sector, and a strong focus on the intersection between security stra...
β€1π1
π Windows+Kali Linux == Winlux - Seamless integration between Windows and Kali Linux
π https://hacklido.com/blog/798-windowskali-linux-winlux-seamless-integration-between-windows-and-kali-linux
π https://hacklido.com/blog/798-windowskali-linux-winlux-seamless-integration-between-windows-and-kali-linux
HACKLIDO
Run Kali Linux in Windows - Winlux | Seamless integration between Windows and Kali Linux
I recently set up my device to run Windows and Kali Linux seamlessly using WSL2, which has streamlined my workflow. Iβve tried various setups including i...
π9β€1
π You Can Plant Flowers And Build Cyber Resilisence
π https://hacklido.com/blog/799-you-can-plant-flowers-and-build-cyber-resilisence
π https://hacklido.com/blog/799-you-can-plant-flowers-and-build-cyber-resilisence
HACKLIDO
You Can Plant Flowers And Build Cyber Resilisence
Abeer Khedr (CISO at National Bank of Egypt) has over two decades of experience in information security and IT consulting. She has led projects in a range...
π Exploiting Cross-Site Scripting XSS vulnerabilities for Bug Bounty β Portswigger | 2024
π https://hacklido.com/blog/808-exploiting-cross-site-scripting-xss-vulnerabilities-for-bug-bounty-portswigger-2024
π https://hacklido.com/blog/808-exploiting-cross-site-scripting-xss-vulnerabilities-for-bug-bounty-portswigger-2024
HACKLIDO
Exploiting Cross-Site Scripting XSS vulnerabilities for Bug Bounty β Portswigger | 2024
The traditional way to prove that youβve found a cross-site scripting vulnerability is to create a popup using the alert() function. This isnβt because XS...
π1
π How to Find more Vulnerabilities β Source Code Auditing Explained
π https://hacklido.com/blog/810-how-to-find-more-vulnerabilities-source-code-auditing-explained
π https://hacklido.com/blog/810-how-to-find-more-vulnerabilities-source-code-auditing-explained
HACKLIDO
How to Find more Vulnerabilities β Source Code Auditing Explained
Introduction Whitebox penetration testing can be intimidating. Complex web applications may contain hundreds of thousands of lines of code and deciphering...
π How I Found My First RCE | CVE-2023-46604 in Apache ActiveMQ
π https://hacklido.com/blog/814-how-i-found-my-first-rce-cve-2023-46604-in-apache-activemq
π https://hacklido.com/blog/814-how-i-found-my-first-rce-cve-2023-46604-in-apache-activemq
HACKLIDO
How I Found My First RCE | CVE-2023-46604 in Apache ActiveMQ
How I Found My First RCE .Ψ§ΩΨ³ΩΨ§Ω
ΨΉΩΩΩΩ
ΩΨ±ΨΩ
Ω Ψ§ΩΩΩ ΩΨ¨Ψ±ΩΨ§ΨͺΩ ΩΨ§ΩΨ΅ΩΨ§Ω ΩΨ§ΩΨ³ΩΨ§Ω
ΨΉΩΩ Ψ±Ψ³ΩΩ Ψ§ΩΩΩ Ψ³ΩΨ―ΩΨ§ Ω
ΨΩ
Ψ― As-salamu alaykum everyone! In this article, Iβll talk...
β€2π₯1
π What Makes A Good Security Researcher?
π https://hacklido.com/blog/815-what-makes-a-good-security-researcher
π https://hacklido.com/blog/815-what-makes-a-good-security-researcher
HACKLIDO
What Makes A Good Security Researcher?
Based at the Nanyang Technological University, Jakub Pruzinec (Security Researcher) has undertaken research in OS security, web security and malware analys...
π€1π1