The Start Your Cybersecurity Journey path on TryHackMe begins with the fundamentals, and one of the most essential is search skills. As cybersecurity professionals, we must know not only where to find information but also how to evaluate, refine, and...
Bababtunde Qodri, an aspiring cybersecurity analyst, believes every security breach starts with reconnaissance — and in this project, he put that theory into practice over just two days. From scanning ports to privilege escalation, I simulated a real...
🔐 PROTECTING YOUR CI/CD PIPELINE: WHY SECURITY CANNOT BE AN AFTERTHOUGHT In today’s fast-paced software development landscape, Continuous Integration and Continuous Delivery (CI/CD) pipelines are the backbone of innovation. They enable rapid deploym...
“Vulnerability, Exploit, and Payload Explained with Simple Cybersecurity Examples” Vulnerabilities:- the actuall weekness of the system through which attacker can attack (e.g., a website not validating user input → SQL Injection vulnerability) Exploi...
Hi guys , I will soon starting posting writeups for upcoming season till then join my discord to never miss an update about writeup . https://discord.gg/Kq7BsUymjD
What was this week about? This week was much calmer compared to the rest, in terms of challenges, as it focused mainly on reviewing the basics of Python and learning a few other things. It was a week of great progress, and as I transition into the se...
📖 Your step-by-step journey to becoming a Cybersecurity Engineer in 2025. 1️⃣ Foundations Networking basics: TCP/IP, Firewalls, VPNs, DNS, HTTP/HTTPS Operating systems: Windows, Linux administration Security fundamentals: CIA triad (Confidentiali...
C - ConfidentialI - IntegrityA - Availability CIA are the pillars of cybersecurity. These play a crucial role in designing security policies.It makes sure that the system is private, accurate, and accessible. 1.) Confidential: It says that the data m...
If you use Visual Studio Code extensions a lot, here is something that might make you pause. Security folks recently found a loophole in the VS Code Marketplace that basically lets attackers take over the names of extensions that were deleted before....
Cyber Attacks are not any random planning attacks , it takes place with a proper planning.This process is known as CYBER KILL CHAIN , a model created by Lockheed Martin.The CYBER KILL CHAIN process is taken under 7 STEPS : 1. RECONNAISSANCE – info...