๐ How hackers think? Inculcating the adversarial mindset
๐ https://hacklido.com/blog/760-how-hackers-think-inculcating-the-adversarial-mindset
๐ https://hacklido.com/blog/760-how-hackers-think-inculcating-the-adversarial-mindset
HACKLIDO
How hackers think? Inculcating the adversarial mindset
An interesting dissertation I recently read a dissertation titled โHow Hackers Think: A Mixed Method Study of Mental Models and Cognitive Patterns of High-Te...
๐ Complete Roadmap for Cyber Security Career Path
๐ https://hacklido.com/blog/761-complete-roadmap-for-cyber-security-career-path
๐ https://hacklido.com/blog/761-complete-roadmap-for-cyber-security-career-path
HACKLIDO
Complete Roadmap for Cyber Security Career Path
Below are some basic requirements and steps to become a cyber security expert: Step 1: Education Requirements Firstly, you must fulfil the basic educatio...
๐ A Quick Look At The NCSC GuideLines For AI Security
๐ https://hacklido.com/blog/759-a-quick-look-at-the-ncsc-guidelines-for-ai-security
๐ https://hacklido.com/blog/759-a-quick-look-at-the-ncsc-guidelines-for-ai-security
HACKLIDO
A Quick Look At The NCSC GuideLines For AI Security
On 27 November 2023, the UKโs National Cyber Security Centre (NCSC) released its new global guidelines for AI security. The Guidelines for Secure AI Syst...
๐ A Rise In Maritime Cyber Threats( And One New Solution)
๐ https://hacklido.com/blog/762-a-rise-in-maritime-cyber-threats-and-one-new-solution
๐ https://hacklido.com/blog/762-a-rise-in-maritime-cyber-threats-and-one-new-solution
HACKLIDO
A Rise In Maritime Cyber Threats( And One New Solution)
Rapid digital transformation and changing regulatory requirements mean that cybersecurity is increasingly important for the maritime industry. Companies...
EU AI Act 2024 - @hacklido.pdf
188.2 KB
Printable - PDF Version
๐ How to start Bug Bounty Hunting $$$$ in 2024??
๐ https://hacklido.com/blog/786-how-to-start-bug-bounty-hunting-in-2024
๐ https://hacklido.com/blog/786-how-to-start-bug-bounty-hunting-in-2024
HACKLIDO
How to start Bug Bounty Hunting $$$$ in 2024??
TL;DR: This guide is tailored for complete beginners. Learn how to hunt down digital bugs, improve cybersecurity skills, and earn $$$$$ along the way! The...
๐ How to Crack an Entry Level Job in Cybersecurity! - 2024
๐ https://hacklido.com/blog/788-how-to-crack-an-entry-level-job-in-cybersecurity-2024
๐ https://hacklido.com/blog/788-how-to-crack-an-entry-level-job-in-cybersecurity-2024
HACKLIDO
How to Crack an Entry Level Job in Cybersecurity! - 2024
Follow these steps & kick-start your career in cyber-security! Learn Computer Network Fundamentals: A strong understanding of networking basics is c...
๐ Launching A Cybersecurity Startup? Do This
๐ https://hacklido.com/blog/791-launching-a-cybersecurity-startup-do-this
๐ https://hacklido.com/blog/791-launching-a-cybersecurity-startup-do-this
HACKLIDO
Launching A Cybersecurity Startup? Do This
Weโre focused onโฆ How to build a high-performing team for your startup. Why? Because at #BHMEA22, Mohammed Almeshekah (Founder and Managing Partner at...
๐ Cat, Mouse, And Endless Curiosity
๐ https://hacklido.com/blog/797-cat-mouse-and-endless-curiosity
๐ https://hacklido.com/blog/797-cat-mouse-and-endless-curiosity
HACKLIDO
Cat, Mouse, And Endless Curiosity
Dr. Srijith Nair (CISO at Careem) has a broad range of experience in the cybersecurity sector, and a strong focus on the intersection between security stra...
๐ Windows+Kali Linux == Winlux - Seamless integration between Windows and Kali Linux
๐ https://hacklido.com/blog/798-windowskali-linux-winlux-seamless-integration-between-windows-and-kali-linux
๐ https://hacklido.com/blog/798-windowskali-linux-winlux-seamless-integration-between-windows-and-kali-linux
HACKLIDO
Run Kali Linux in Windows - Winlux | Seamless integration between Windows and Kali Linux
I recently set up my device to run Windows and Kali Linux seamlessly using WSL2, which has streamlined my workflow. Iโve tried various setups including i...
๐ You Can Plant Flowers And Build Cyber Resilisence
๐ https://hacklido.com/blog/799-you-can-plant-flowers-and-build-cyber-resilisence
๐ https://hacklido.com/blog/799-you-can-plant-flowers-and-build-cyber-resilisence
HACKLIDO
You Can Plant Flowers And Build Cyber Resilisence
Abeer Khedr (CISO at National Bank of Egypt) has over two decades of experience in information security and IT consulting. She has led projects in a range...
๐ Exploiting Cross-Site Scripting XSS vulnerabilities for Bug Bounty โ Portswigger | 2024
๐ https://hacklido.com/blog/808-exploiting-cross-site-scripting-xss-vulnerabilities-for-bug-bounty-portswigger-2024
๐ https://hacklido.com/blog/808-exploiting-cross-site-scripting-xss-vulnerabilities-for-bug-bounty-portswigger-2024
HACKLIDO
Exploiting Cross-Site Scripting XSS vulnerabilities for Bug Bounty โ Portswigger | 2024
The traditional way to prove that youโve found a cross-site scripting vulnerability is to create a popup using the alert() function. This isnโt because XS...
๐ How to Find more Vulnerabilities โ Source Code Auditing Explained
๐ https://hacklido.com/blog/810-how-to-find-more-vulnerabilities-source-code-auditing-explained
๐ https://hacklido.com/blog/810-how-to-find-more-vulnerabilities-source-code-auditing-explained
HACKLIDO
How to Find more Vulnerabilities โ Source Code Auditing Explained
Introduction Whitebox penetration testing can be intimidating. Complex web applications may contain hundreds of thousands of lines of code and deciphering...
๐ How I Found My First RCE | CVE-2023-46604 in Apache ActiveMQ
๐ https://hacklido.com/blog/814-how-i-found-my-first-rce-cve-2023-46604-in-apache-activemq
๐ https://hacklido.com/blog/814-how-i-found-my-first-rce-cve-2023-46604-in-apache-activemq
HACKLIDO
How I Found My First RCE | CVE-2023-46604 in Apache ActiveMQ
How I Found My First RCE .ุงูุณูุงู
ุนูููู
ูุฑุญู
ู ุงููู ูุจุฑูุงุชู ูุงูุตูุงู ูุงูุณูุงู
ุนูู ุฑุณูู ุงููู ุณูุฏูุง ู
ุญู
ุฏ As-salamu alaykum everyone! In this article, Iโll talk...
๐ What Makes A Good Security Researcher?
๐ https://hacklido.com/blog/815-what-makes-a-good-security-researcher
๐ https://hacklido.com/blog/815-what-makes-a-good-security-researcher
HACKLIDO
What Makes A Good Security Researcher?
Based at the Nanyang Technological University, Jakub Pruzinec (Security Researcher) has undertaken research in OS security, web security and malware analys...