π My debut with a Critical Bug: How I found my first bug (API misconfiguration)
π https://hacklido.com/blog/599-my-debut-with-a-critical-bug-how-i-found-my-first-bug-api-misconfiguration
π https://hacklido.com/blog/599-my-debut-with-a-critical-bug-how-i-found-my-first-bug-api-misconfiguration
HACKLIDO
My debut with a Critical Bug: How I found my first bug (API misconfiguration)
Finally, the day arrived when I could share my own findings, rather than just reading other researchersβ findings (which I truly love to do, as they are a...
π What and What' Not to expect from OSINT | Day2 of 30DaysOfOSINT
π https://hacklido.com/blog/600-what-and-what-not-to-expect-from-osint-day2-of-30daysofosint
π https://hacklido.com/blog/600-what-and-what-not-to-expect-from-osint-day2-of-30daysofosint
HACKLIDO
What and What' Not to expect from OSINT | Day2 of 30DaysOfOSINT
The main aim of writing this blog is to explaining people about ground realities of OSINT world. Letβs first understand what not to expect from OSINT: O...
β€1π1
π The OSINT Cycle: Getting familiar with process of data collection and analysis | Day3 of 30DaysOfOSINT
π https://hacklido.com/blog/601-the-osint-cycle-getting-familiar-with-process-of-data-collection-and-analysis-day3-of-30daysofosint
π https://hacklido.com/blog/601-the-osint-cycle-getting-familiar-with-process-of-data-collection-and-analysis-day3-of-30daysofosint
HACKLIDO
The OSINT Cycle: Getting familiar with process of data collection and analysis | Day3 of 30DaysOfOSINT
The main aim of writing this blog is to making people familiar with the OSINT cycle. What is OSINT Cycle ? As we have understood that OSINT is all about...
β€1π1
π Android Pentesting Series β I : Configuring The Android Emulator/Device With Proxy (Burp)
π https://hacklido.com/blog/602-android-pentesting-series-i-configuring-the-android-emulatordevice-with-proxy-burp
π https://hacklido.com/blog/602-android-pentesting-series-i-configuring-the-android-emulatordevice-with-proxy-burp
HACKLIDO
Android Pentesting Series β I : Configuring The Android Emulator/Device With Proxy (Burp)
Configuring Android emulator/Device can be Quite hectic Process To Properly Setup. So here I made a simple Step By Step Guide To Configure The Emulator With...
π1
π The OSINT Approaches | Day4 of 30DaysOfOSINT
π https://hacklido.com/blog/603-the-osint-approaches-day4-of-30daysofosint
π https://hacklido.com/blog/603-the-osint-approaches-day4-of-30daysofosint
HACKLIDO
The OSINT Approaches | Day4 of 30DaysOfOSINT
The main aim of writing this blog is to making people familiar with active and passive OSINT. Before we start learning about real life use cases of OSINT...
π2β€1
π Exploring the Power of OSINT: Use Cases in Various Fields of Cybersecurity | Day5 of 30DaysOfOSINT
π https://hacklido.com/blog/604-exploring-the-power-of-osint-use-cases-in-various-fields-of-cybersecurity-day5-of-30daysofosint
π https://hacklido.com/blog/604-exploring-the-power-of-osint-use-cases-in-various-fields-of-cybersecurity-day5-of-30daysofosint
HACKLIDO
Exploring the Power of OSINT: Use Cases in Various Fields of Cybersecurity | Day5 of 30DaysOfOSINT
The main aim of writing this blog is to making people various use cases of OSINT in various fields of cybersecurity As we have already learned about OSINT,...
β€1π1
π Android Pentesting Series β II : Setting up the CA Certs For Intercepting Web Traffic
π https://hacklido.com/blog/605-android-pentesting-series-ii-setting-up-the-ca-certs-for-intercepting-web-traffic
π https://hacklido.com/blog/605-android-pentesting-series-ii-setting-up-the-ca-certs-for-intercepting-web-traffic
HACKLIDO
Android Pentesting Series β II : Setting up the CA Certs For Intercepting Web Traffic
In The First Part Iβve Shared about How to Configure The Android Emulator/Device With Proxy (Burp) Iβd recommend If you havenβt checked The First Part. Chec...
π1
π Hacklido Bi-Monthly Newsletter's 1st version is up for September.
π Apologies, for the delayed issues due to some issues. Make sure to subscribe to our Newsletter for receiving monthly updates for InfoSec
Date: 15th September, 2023
πhttps://hacklido.substack.com/p/cyber-security-round-up-september
π Apologies, for the delayed issues due to some issues. Make sure to subscribe to our Newsletter for receiving monthly updates for InfoSec
Date: 15th September, 2023
πhttps://hacklido.substack.com/p/cyber-security-round-up-september
Substack
Cyber Security Round Up - September 15th, 2023
Android Pentesting, OSINT Guide, Threat Detection, Directory Traversal, Reverse Engineering,Cloud Security and more.
π Mastering OSINT: Building the Ultimate Environment for Open Source Intelligence | Day6 of 30DaysOfOSINT
π https://hacklido.com/blog/607-mastering-osint-building-the-ultimate-environment-for-open-source-intelligence-day6-of-30daysofosint
π https://hacklido.com/blog/607-mastering-osint-building-the-ultimate-environment-for-open-source-intelligence-day6-of-30daysofosint
HACKLIDO
Mastering OSINT: Building the Ultimate Environment for Open Source Intelligence | Day6 of 30DaysOfOSINT
The main of aim of writing this blog is to help you guys in setting up your virtual environment for OSINT. Before we deep dive into to installing Linux an...
π1
π Cisco's Historic $28 Billion Acquisition of Splunk in Cash
π https://hacklido.com/blog/608-ciscos-historic-28-billion-acquisition-of-splunk-in-cash
π https://hacklido.com/blog/608-ciscos-historic-28-billion-acquisition-of-splunk-in-cash
HACKLIDO
Cisco's Historic $28 Billion Acquisition of Splunk in Cash
In a monumental move, Cisco is set to acquire cybersecurity powerhouse Splunk for $28 billion in a cash transaction, marking the companyβs most significant...
π Setting up your own VM for OSINT | Day7 of 30DaysOfOSINT
π https://hacklido.com/blog/609-setting-up-your-own-vm-for-osint-day7-of-30daysofosint
π https://hacklido.com/blog/609-setting-up-your-own-vm-for-osint-day7-of-30daysofosint
HACKLIDO
Setting up your own VM for OSINT | Day7 of 30DaysOfOSINT
The main aim of writing this blog is teaching you how to setup your own VM for OSINT for best results. Before we start setting up the VM for OSINT. Letβs...
π3
π Revealing Deepfakes with Blockchain
π https://hacklido.com/blog/610-revealing-deepfakes-with-blockchain
π https://hacklido.com/blog/610-revealing-deepfakes-with-blockchain
HACKLIDO
Revealing Deepfakes with Blockchain
When we interviewed Suresh Sankaran Srinivasan (Group Head of Cyber Defence at Axiata) for the blog, he mentioned that deepfake tech is giving threat actor...
π Should employees use their own devices at work?
π hacklido.com/blog/611-should-employees-use-their-own-devices-at-work
π hacklido.com/blog/611-should-employees-use-their-own-devices-at-work
HACKLIDO
Should employees use their own devices at work?
The pros and cons of an organisation letting its employees use their own mobile devices for work. Why? π Because weβve been thinking about something Georg...
π Hacklido Bi-Monthly Newsletter's 2nd version is up for September.
π Make sure to subscribe to our Newsletter for receiving monthly updates for InfoSec
Date: 30th September, 2023
πhttps://hacklido.substack.com/p/cyber-security-round-up-september-b80
π Make sure to subscribe to our Newsletter for receiving monthly updates for InfoSec
Date: 30th September, 2023
πhttps://hacklido.substack.com/p/cyber-security-round-up-september-b80
Substack
Cyber Security Round Up - September 30th, 2023
Android Pentesting, OSINT Guide, Web Security, Bug Bounty, Data Breaches, Malware Analysis and more.
π What is an application security engineer?
π https://hacklido.com/blog/613-what-is-an-application-security-engineer
π https://hacklido.com/blog/613-what-is-an-application-security-engineer
HACKLIDO
what is an application security engineer?
Introduction: An application security engineer is responsible for ensuring that the software is secure from potential threats. They set up checkpoints to...
π1
π How to be Indispensable in Cybersecurity
π https://hacklido.com/blog/615-how-to-be-indispensable-in-cybersecurity
π https://hacklido.com/blog/615-how-to-be-indispensable-in-cybersecurity
HACKLIDO
How to be Indispensable in Cybersecurity
People at the early stages of an information security career face a paradoxical set of circumstances: Thereβs a widely reported skills shortage in cyber...
β€3
π Attackers rely on automation and how you can use it against them
π https://hacklido.com/blog/618-attackers-rely-on-automation-and-how-you-can-use-it-against-them
π https://hacklido.com/blog/618-attackers-rely-on-automation-and-how-you-can-use-it-against-them
HACKLIDO
Attackers rely on automation and how you can use it against them
With the boom of generative AI tools, threat actors have even more capacity to automate their operations and attack more organisations with greater effic...
π1
π Why enthusiasm is a vulnerability for crypto users
π https://hacklido.com/blog/619-why-enthusiasm-is-a-vulnerability-for-crypto-users
π https://hacklido.com/blog/619-why-enthusiasm-is-a-vulnerability-for-crypto-users
HACKLIDO
Why enthusiasm is a vulnerability for crypto users
Cryptocurrency enthusiasts have become the targets of a new cybercrime tactic. Criminals are creating fake blockchain games, laced with malware that stea...