paint-brush
678 Stories To Learn About Cybersecurityby@learn
281 reads

678 Stories To Learn About Cybersecurity

by Learn RepoNovember 7th, 2023
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Learn everything you need to know about Cybersecurity via these 678 free HackerNoon stories.

People Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - 678 Stories To Learn About Cybersecurity
Learn Repo HackerNoon profile picture

Let's learn about Cybersecurity via these 678 free stories. They are ordered by most time reading created on HackerNoon. Visit the /Learn Repo to find the most read stories about any technology.

Hacking is not a crime! Or is it? Well, it depends on which hat you are wearing. Find all about Offense-Defense dilemmas, theories, and practicals here!

1. Risk DAO Conducts Technology Risk Assessment on Aurigami Finance

Aurigami conducted a risk analysis of the protocol's risk parameters in an effort to reduce technological risks and improve capital efficiency.

2. How to Avoid Credit Card Skimming: 5 Tips to Keep Your Information Safe

Credit card skimming occurs when someone places an electronic device on or near a credit card reader. This device captures and stores your credit card details.

3. How to Hack TikTok Accounts : 5 Common Vulnerabilities

As TikTok has become a popular platform, it has also become an easy target for hackers. These are the 5 common vulnerabilities that can be used to hack TikTok.

4. 5 Best Free Proxy Servers To Visit Sites Anonymously In 2020

A proxy server will assist you to mask your identity on the web. Perhaps you wish to access suspicious websites, bypass net censorship in your country or on your office/school network having a proxy website among your reach is very important.

5. How Twitter Can Satisfy Elon Musk's Request for Fake Account Clarity

Twitter claims that less than 5% of users are fake. Is Elon Musk right to be skeptical? Until a proper test is run, nobody truly knows how bad the situation is.

6. Uber & Thycotic: Are Password Vaults a Huge Security Vulnerability?

The Uber hack showed that password vaults come with a security risk. Still, if set up correctly they improve security for companies.

7. How to Hack Facebook Accounts: 5 Common Vulnerabilities in 2023

There are 5 common vulnerabilities that attackers can exploit to hack Facebook accounts. They include weak passwords, phishing, remote loggers, MITM, and DoS.

8. How to Hack Instagram: 5 Common Vulnerabilities

There are 5 common methods attackers may use to hack Instagram accounts such as weak passwords, phishing email, OS vulnerabilities & zero day vulnerabilities.

9. How to Hack Facebook Messenger: 6 Methods and Vulnerabilities

Spyier, keylogging, and hacking using cookies are some of the most common ways Facebook Messenger accounts get hacked.

10. Delete These Apps to Speed and Space up Your Phone

Smartphones, the smart technology at our fingertips has geared our lifestyles to optimal levels.

11. Why You Should Protect Your Cell Phone Number and How to Do It

With only your cell phone number hackers become you!

12. How to Hack Your Alexa using a Voice Command-SQL Injection

Based on your previous coverage of similar topics, we thought you may be interested in this recently discovered voice activation device hack, and a new technique we call Voice-Command SQL Injection.

13. Kali Linux vs Parrot Security OS: Operating System for Penetration Testing in a Nutshell

We compare Kali Linux to ParrotOS and go over the pros and cons of each operating system.

14. How to Hack Bluetooth Devices: 5 Common Vulnerabilities

This article discusses the five common vulnerabilities (BlueBorne, Bluesnarfing, Bluejacking, BIAS & Bluebugging) that allow hackers to hack Bluetooth devices.

15. I hacked 40,000 passwords with Python. Yours might've been one of them.

Remember the good old days when you were passing love notes to your crush across the classroom?

16. How to Map Your Home Networks Using NMAP

Here's to learning basics of networking and an awesome tool called NMAP

17. How to Hack Android Phones

There's a big difference between hackers (people who like to experiment with computer systems to make them do unintended things) and attackers .

18. Windows Sticky Keys Exploit: The War Veteran That Never Dies

Did you ever hear of Sticky Keys Exploit? You probably did, since it has been known for ages. It was used as an exploit many times, fought in many windows versions, and it has never been killed. That’s why I’m calling it the “War Veteran”, although it never retired…

19. The Rise of Zero-Trust Architecture

What is Zero-Trust Architecture and why is it Relevant Today?Breaking Down Zero Trust Architecture:

20. 5 Best Browser Extensions For Protecting Your Privacy Online

It is essential for every internet user to comprehend the importance of browser security capabilities to assure they browse the internet safely. Protecting your browser might mean limited functionality of some web sites, but it’ll shield your most sensitive information as well.

21. 5 Best Cybersecurity Books for Beginners

These are the five cybersecurity books that you should start with if you are considering a career within the industry.

22. Why Governments Use Mass Surveillance⁠—And What To Do About It

“I’m not a terrorist, why should I be worried about my data being monitored?”

23. Facts You Probably Didn't Know About The Dark Web

The dark web refers to encrypted online content that is not indexed by conventional search engines. Sometimes, the dark web is also called the dark net.

24. Part 2: How to stop me harvesting credit card numbers and passwords from your site

I wrote a post recently describing how I distributed malicious code that gathers credit card numbers and passwords from thousands of sites in a way that’s quite difficult to detect.

25. It's Raining Cyber Attacks: Cybersecurity in the Cloud

With the latest news and advancements in the cybersecurity world, we will see how these new rules impact modern cloud applications.

[26. With Cyber Threats on the Rise,

Nero Consulting Encourages Businesses to Keep Their Guard Up](https://hackernoon.com/with-cyber-threats-on-the-rise-nero-consulting-encourages-businesses-to-keep-their-guard-up) Nero Consulting CEO Anthony Oren has watched countless companies suffer from the lack of preventative measures to secure their systems.

27. The NuID Ecosystem: An Improved Identity Layer Putting Identity Ownership In Users’ Hands

The internet grew without an identity layer, meaning it grew without a reliable way of knowing or verifying who you were connecting to which can be dangerous.

28. How Did Lendf.Me Lose $25 Million to A Reentrancy Attack? [An Analysis]

DeFi or decentralized finance is a growing sector in the blockchain and cryptocurrency space that defines an ecosystem of decentralized applications providing financial services with no governing authority.

29. How To Find Out If A Hacker Has Attacked You

Computer crimes are all those online attacks carried out by a hacker whose purpose is to breach a computer system in order to gain financial gain in some way

30. A Shapeshifter Under the Hoodie: The Face of Modern Cybercrime

The face of modern cybercrime is not the stereotype of a hacker. It's a mirror, reflecting the people close to you. And the perpetrator could be anyone.

31. How My Mother Got Hacked by a Phishing Attack

My mom got hacked and probably your mom too. How a social engineering attack works on vulnerable users.

32. Enter the Cybersecurity, Finance, and Linux Writing Contests: NOW OPEN.

Good contests come in threes.

33. Adversarial Machine Learning: A Beginner’s Guide to Adversarial Attacks and Defenses

Learn what's adversarial machine learning, how adversarial attacks work, and ways to defend them.

34. How to Create a Random Password Generator Using Python

Create a random password generator using Python by generating a combination of letters, numbers, and symbols as characters scrambled together

35. The Infamous Hacker Bjorka's Top 7 Leaks that Shocked the Public

In addition to sharing personal data of essential people in Indonesia, Bjorka also studied death cases such as Munir and Brigadier J. Who was Bjorka?

36. How to Get a Reverse Shell on macOS Using A Flipper Zero as a BadUSB

Using a Flipper Zero as an ethical pentesting device to establish a reverse shell on a macOS computer.

37. What is URL Masking and How Does It Work?

Be careful of the latest engineering technique called "URL Masking", it's quite dangerous.

38. Exploring Quality in Pentesting

Quality in pentesting can mean different things for different groups of people--from the prospective buyer to an existing customer

39. 5 Popular Hacker Hardware Tools in 2022

A look at some of the hardware tools that hackers use to access and corrupt your computer.

40. How To Start A Career in Cyber Security?

As we move forward into the age of technology, and as business people, there is one that should always remember. That thing is simply this; the more advanced technology gets, the more danger there is when it comes to cyber threats.

41. PlugX & PortScan Chinese Malware Surfacing in Non-Tech Companies

PlugX & PortScan Chinese Malware Surfacing in Non-tech Companies - shows Motivation Was Financial.

42. 5 Negative Behavioral Effects of Cyber Security on Organization

The effect of individual behavior on cyber-security is essential to the safety and protection of information or data in corporate organizations, government, financial institutions, and all other organizations you can imagine. The risk of breaching has a negative effect and has severe consequences.

43. 4 Signs Your Instagram Has Been Hacked (and What to Do)

How can you tell if your Instagram has been hacked and what can you do about it? Find out the signs of hacked Instagram accounts and how they affect businesses

44. Homomorphic Encryption — for Web Apps 🧐 (Part 2)

In case you missed the previous article (Part 1), I gave a very brief introduction on Homomorphic Encryption (HE), talked about Microsoft SEAL’s library, and outlined some of the pain points of learning to use it.

45. 'Serverless': Malware Just Found a new Home

Read about 'Serverless' data security and its ugly truth.

46. How Do I Adopt a 'Zero Trust' Framework?

With increased attack surfaces caused by businesses migrating to the cloud and remote workers, Zero Trust has become cybersecurity's most valuable thing.

47. Domain Fronting 101: What is Domain Fronting and How Does it Work?

Domain fronting is one technique that hackers use to bypass internet censorship. This method is used to access restricted sites that would typically be blocked.

48. IP Addresses Are Key to Countering Brute-force Attacks

Verizon’s 2020 Data Breach Investigations Report shows that 80% of the breaches caused by hacking involve brute-force or the use of lost or stolen credentials. The content management systems (CMS) are the usual targets of brute-force attacks, as 39.3% of all the websites presumably run on WordPress, the most popular of these.

49. 10 Reasons to Get Your Cybersecurity Certification

The set of skills that are mostly expected by the employers can be gained by the cybersecurity certifications, it will prepare you for the diversity needed in the sophisticated areas of cybercrime. So, here are the top compiling reasons for you to pursue the additional cybersecurity credentials.

50. Is Cyber Security Hard? How to Find Your Way in

Cybersecurity is a broad, changing, challenging and complex field. To get into it, go beyond application forms with the tips described here.

51. 5 Tips to Prevent Hackers From Stealing Your Crypto Assets

With the continuing rise of cybercrime and targeting private computers, tablets, and phones, the question is not if but when you will be hacked. So, better safe than sorry, make sure your crypto assets are safe and secure even if your device is breached by sticking to the following tips.

52. Fake Websites, Fake Companies, Fake Everything: What Can We Do to Protect Ourselves?

Malware protection should act the same way, as a set of shields that protect the entire browser from any type of malware, not just traditional threats.

53. Military Grade Encryption Won’t Save You, or Your Business

With two recent vulnerabilities making headlines this month, notably CVE-2019-14899, impacting VPNs running on Linux distros and Atlassian’s zero-day flaw reported by SwiftOnSecurity concerning leak of private keys, it should be no surprise anymore as to why encryption merely breeds a feeling of security rather than guaranteeing it.

54. What happened After I Scanned 2.6 Million Domains for Exposed .DS_Store Files

55. Black Hat Hacking Forums Get Hacked: Possibly a LulzSec Attack

Presently, the world of black hat forums appears to be engulfed in a series of cyberattacks. According to a Telegram channel, on 18th June 2019 it was reported that three leading black hat hacking forums were reportedly exploited, affecting an aggregate of over 260,000 hackers. From the disclosed data, it appears as though the creator of the aforementioned Telegram Channel has access to certain Ukrainian police files which may have led to the leak.

56. Bad Guys From the Future

What cyber threats does the future hold?

57. How to Reduce Your Chances of Being a Victim of Identity Theft

The major causes of identity theft, along with some simple steps you can take to lower your risk of exposure dramatically.

58. Is WhatsApp Safe?

WhatsApp is the most popular messenger owned by Facebook. According to the official stats, the number of WhatsApp active users has reached 1 billion in 2020. Just imagine, approximately 65 million messages are sent via this social app daily.  Since the app is so popular, it’s very attractive for hackers. In this article, I’ll tell you about the major WhatsApp security threats, which will help you protect your chats and shared media from hackers, WhatsApp spy apps, and keylogging software.

59. The Noonification: 6 Best SQL Programming Books Ranked by Reviews (12/17/2022)

12/17/2022: Top 5 stories on the Hackernoon homepage!

60. How to Protect Your Netflix Account from Getting Hacked

Netflix accounts getting hacked are the least bit of anyone’s concern. Not because it doesn’t mean anything to us, but we anticipate little harm from it. After all, what more can a hacker do than to watch a few titles, get to see their favorite shows or movies? But that’s not always the case. We have left this issue unsupervised for far too long, and there is harm more significant than we give credit for.

61. How to Combat Cyber Security Threats and Attacks

Progress in complex technology can result in the ‘progress’ of complex threats.

62. How WordPress Sites Get Hacked: 5 Common Vulnerabilities & How to Prevent Them

WordPress is a popular platform that many use to create their own webpage. Due to its popularity, there is a higher chance of attackers hacking WordPress sites.

63. Breaking Down 3 API Security Breaches

The following three API security breaches provide helpful lessons for improving security today.

64. How to Avoid Becoming a Victim of Data Breach

The term data has emerged out of its clichéd meanings and definitions. A lateral thought on the same might suggest that data in modern times is your life expressed in cryptic format owing to the considerable amount of time that we are now devoting towards shifting our lives from a manual to a digital gear. Losing out on data can be thought of as losing a part of your sensitive details, which you might not be willing to share as such.

65. Explaining Info-Sec in Layman's Terms [Part I]

Understanding the common keywords used in the info-sec industry that are used in conjunction with that complicated OWASP Top 10 WAST

66. 7 Ways to Improve Cybersecurity when You Travel in 2022

If you travel frequently, you should know how to safeguard your data. Think about these things before taking off on your next vacation.

67. Everything You Need to Know About Web Application Penetration Testing Services

In this blog post, we'll discuss why it's important to have regular penetration tests performed on your web applications.

68. How to Spot Honeypot Crypto Scams

Honeypot Crypto Scam is very common in blockchain industry. Tips are here to avoid such scams and save your money.

69. What do we expect in innovation and technology by 2020

With the beginning of a new decade, many users set expectations for the new year. But what are the novelties that will be in technology and innovation

70. Google’s Data-Hungry Ecosystem is Threatening Your Privacy. Here’s How.

Google rewards data brokers for violating your privacy. Understand the hidden relationship between the #1 search engine and information brokers.

71. 8 Ways Crypto Wallets Can be Hacked

Today there are a lot of ways how to hack a cryptocurrency wallet. I discuss 8 vulnerabilities for your cryptocurrencies in the wallet and how to protect them.

72. 6 Data Cybersecurity Challenges with Cloud Computing

It is important to keep your data safe and secure. Here are six challenges in that hosting your data on the cloud can pose and how your data security can help.

73. How to Hack Ethically

Ethical hacking's main goal is to find a system's flaws or vulnerabilities and secure it against hackers.

74. How Hackers Attack Subdomains and How to Protect Them

In this detailed guide, you will find what dangers exposed subdomains hide, how perpetrators can use them, how to find subdomains, and how to defend them.

75. Trends in Artificial Intelligence (AI) for 2022 & Beyond

Artificial Intelligence has come a long way, now spearheading automation in various fields. Read on to see what the coming years have in store for AI.

76. [CTF Series #1] The Reverse Engineering Challenge

Objective:

77. How to Explain the Internet to Your Kids

There is only one way to explain the dangers of the Internet to children: to be there with them. Talk about the good and the bad that that the internet offers.

78. Confidential Computing: How Intel SGX is Helping to Achieve It

Learn more about confidential computing and how Intel SGX is used to encrypt sensitive data in memory, enabling compliant collaboration between organizations.

79. The Challenge of Fighting Crime on the Deep and Dark Web

Cybercriminals tend to migrate from one technology to the next to hide from law enforcement. So how can LEA monitor their activities in so many places?

80. Is TikTok a Security Risk for Businesses?

Possible security and ethical concerns on TikTok raise questions about whether businesses should be using the platform.

81. Software Ages Like Milk, Not Wine: Why Open Source Vulnerabilities Matter

Malware attacks in open source ecosystems have exponentially increased in the last 2 years. How do we build cybersecurity that scales to meet this challenge?

82. 6 Major SCADA Attacks That Happened And Their Consequences

Here we will look at the top SCADA attacks that have happened in the past.

83. Binance Suffered Major Hack in 2018: KYC Documents of Millions Now Being Leaked

Binance, the crown jewel of the cryptocurrency industry was hacked back in late 2018, with the hacker claiming to have the KYC documents of all users. The extent to what data was breached is still not clear, but one thing is for certain: pictures and scans. And now they're being leaked to the public at an incredibly rate.

84. How to Encrypt a PDF Using Python

Encryption is a way of encoding human-readable data with encrypted code that enables the use of a password to view the source and data stored.

85. GitHACK! We are the vulnerability

Github has been hacked. The affected computers cloned the affected repositories. How much is it Github's fault? How can we protect ourselves from this?

86. Cybersecurity Best Practices and Risks [Infographic]

No business in the world can do away with cybercriminals. What’s worse, at times businesses are hit so hard, that they’re left with no other choice but to succumb to their losses.

87. JA3 and JA3S in Security Monitoring of SSL Communication

JA3 and JA3S are TLS fingerprinting methods that may be useful in security monitoring to detect and prevent against malicious activity within encrypted traffic.

88. XDR and its Components Explained — Open XDR vs. Native XDR

Companies have a few options for extended detection and response (XDR) products. But in general, there are primarily two types of XDR —Open and Native.

89. The Domain Reputation API Test: 7 Must-Dos to Score High

Your domain’s reputation can make or break your business. A content website that’s meant to entice readers to subscribe to its RSS feed, follow on social media, or just generally consume what it serves on a daily basis and gets thousands or millions of followers is a success. An e-commerce site that manages to reach its intended monthly sales quota is also successful. And these scenarios are what all businesses with an online presence aim for.

90. Scanning 2.6 Million Domains for Exposed .Env Files

A software developer scanned 2.6 million domains for exposed.env files.

91. Remembering and Honoring the Cybersecurity Pioneer John McAfee

One Year Later - Why Does It Still Matter?

92. An Intro to Privacy Enhancing Technologies (PET) and Why We Need Them

After 2021, a year already marked by the amount - and the size - of data leaks and cyberattacks, PET will be one of the best defensive techniques.

93. Impacts of Double Extortion Ransomware Attack on Enterprises and Mitigation

Double Extortion Ransomware Attack is nefarious and seems unstoppable. However, it can be mitigated with some effective techniques.

94. How Much Does the CEH Exam Cost?

EC-Council’s Certified Ethical Hacker (CEH) is one of the most established and recognized offensive security certifications. The certification is ANSI-accredited and DoDD 8140-approved because of which the certification in highly valued by security professionals from both the public and private sectors. Since CEH is the gold standard for validating offensive security skills, the CEH certification cost is around $1,199 and the cost to retake the exam is $450.  This article will cover the various processes you have to go through to earn this certification as well as the associated costs.

95. Using the Common Vulnerability Scoring System

The common vulnerability scoring system (CVSS) is a way to assign scores to vulnerabilities on the basis of their principal characteristics.

96. A Quick Guide to JSON Web Token [JWT]

JSON Web Token (JWT) is an open standard (RFC 7519) for securely transmitting information between parties as JSON objects.

97. Inside a Hacker's Backpack: Gadgets, Tips, and Tricks for Hackers

Not ever hack job requires just a laptop and some software to gain privileges into a system. Sometimes, something extra is required to make the job very easy

98. Basic Ways AI Disrupts Our Cybersecurity Practices

Artificial Intelligence, the term which first originated in the 1950s has now emerged as a prominent buzzword all over the world. More than 15% of companies are using AI and it is proving to be one of the most powerful and game-changing technology advancements of all time. From Siri to Sophia, the technology has people noticing it and wondering how this will impact their future.

Presently, Artificial Intelligence is seen everywhere. Major industries like healthcare, education, manufacturing, and banking are investing in AI for their digital transformation. Cybersecurity, being the major concern of the digital world, is still uncertain about the impact AI will have on it. With the fast-growing cyber attacks and attackers, cybercrime is growing to become a  massively profitable business which is one of the largest threats to every firm in the world. For this very reason, many companies are implementing Artificial Intelligence techniques which automatically detect threats and fight them without human involvement.

How AI Is Enhancing Cybersecurity Artificial Intelligence is improving cybersecurity by automating complicated methods which detect attacks and react to security breaches. This leads to improvement in monitoring incidents leading to faster detection of threats and its consequent responses. These two aspects are quite essential as they minimize the damages caused. Various Machine Learning algorithms are adapted for this process depending on the data obtained. In the field of cybersecurity, these algorithms can identify exceptions and predict threats with greater speed and accuracy.

99. How Developers Will Work in 2022

The job of developers has never been more difficult. There is constant pressure to keep up with the trends. Here are a few to keep in mind for 2022.

100. Best Domain and Brand Monitoring Tools in the Market Today: A Quick Guide

Brand and domain strategy and protection go hand in hand, as your domain is an integral part of your business identity. Brand abuse is not limited to selling counterfeit goods and copyright infringement, however.

101. 5 Apps to Monitor Your Kids Online Activity Without Them Knowing

Dealing with real-life problems has always been challenging, but now, you must know how to deal with digital negative consequences, or your kids can interact with digital dangers. Parents often do not take the internet dangers seriously, and their children have to face such issues later. You can also make many things possible using technology, but if you know how to make everything possible.

102. How to Protect Your Smart Vehicle from Cyberattacks

Smart vehicles make driving a thrill! However, they are vulnerable to cyberattacks. Making smart security choices keeps you safe and your connected ride secure.

103. The Best Cybersecurity Practices for Data Centres

Read on to learn about the specifications of data center security and the risks that threaten it. Discover the cybersecurity best practices that you need.

104. A Comprehensive Guide to Security Certification for SaaS

In this article, we will explore what security certification for SaaS is, its importance, and how to get the best out of it by minimizing the risks.

105. The Vulnerabilities of NFC Payments Need to be Addressed

Even though NFC appears to be so easy and convenient, it is not without its vulnerabilities, especially in regards to security.

106. Your Facebook Privacy Guide for 2022

Checking every single privacy option on Facebook takes time — but it’s time well-spent if you care about controlling your privacy online.

107. Top 5 Gaming VPNs: Free, Trial, and Paid Options

NordVPN, CyberGhost, and ExpressVPN are some of the best gaming VPNs on the market with free trials and affordable monthly rates. This article will explain why.

108. Rethinking Email Threat Detection Models for Enterprises [A Deep Dive]

Contrary to what millennial work and communication habits may suggest, email is not dead. It is still an important part of both personal and enterprise communications.

109. Cybersecurity in Web3: How to Jump on the Bandwagon Safely

The article addresses common cybersecurity vulnerabilities identified during smart contract audits, social engineering's role in web3-related cyber fraud, etc.

110. A Guide to Password Hashing: How to Keep your Database Safe

Hashing algorithms are one-way functions. They take any string and turn it into a fixed-length “fingerprint” that is unable to be reversed. This means that if your data in your database is compromised, the hacker cannot get the user’s passwords if they were hashed well because at no point were they ever stored on the drive without being in their hashed form.

111. The Ultimate Security Guide for Cryptocurrency Investors

112. How Email Became the Weakest Link in Cybersecurity

When did email become the weakest security link? Email was never intended to transmit sensitive information, but as with all technologies people began using it differently than it was intended to be used and it wasn’t long before hackers learned they could send malicious links and malware directly to a person’s computer via email. These days we know that email can contain malicious links, but we aren’t always trained to spot them, and sometimes we assume the spam filters will take care of it for us. Email has become the weakest link, and it’s costing businesses big time.

113. How to Harden K8S: Based On the Recent Updated NSA's Kubernetes Hardening Guide

Recently, NSA updated the Kubernetes Hardening Guide, and thus I would like to share these great resources with you and other best practices on K8S security.

114. Hunting Pedophiles On The Dark Web: How I Started Doing It

It started when I was 17, a high school senior about to graduate, wondering what career path I wanted to take. At the time I was doing three IT courses, so naturally going to University for Cybersecurity made sense.

115. Quality Assurance in Pentesting: An Intro to Pentest Preparation

Pentesting is a crucial part of ensuring that your product is resilient against cyber attacks. Properly preparing for it will keep costs down help the process.

116. Online Privacy is Not an Option: It's a Necessity

How the challenge of protecting personal information online led to data protection and privacy laws in the EU and U.S.

117. How to Keep Your Mobile Devices Secure

Our phones are our lifelines. They hold our prized possessions such as photos, music, and texts from our loved ones. So, why wouldn’t we do everything we can to

118. Verifiable Credentials: What They Are, Why They Matter

119. 6 Domain Name Registration Drivers in Q2 2022

WhoisXML API researchers identified six notable domain registration drivers for Q2 2022. Check an overview of the key findings and takeaways.

120. How Snapchat Accounts Get Hacked: 5 Indicators of Compromise

Vulnerabilities and social engineering methods may allow attackers to hack Snapchat accounts quite easily.

121. Do NOT Leave GraphQL Exposed Online

In this post, I’d like to share my unpopular opinion on what GraphQL is really meant to be.

122. How to Tell if Your Twitter Has Been Hacked

Twitter is a popular social media platform used to interact with other users via tweets. These four indicators will help tell if your Twitter has been hacked.

123. How “Predictive Text” Functionality can Reproduce Mnemonic Crypto Wallet Phrases

Redditor Andre, an information security practitioner, accidentally discovered that the smartphone's "predictive words" function guessed the mnemonic of his bitc

124. How SeedOn Is Bringing Smart Contracts to Equity Crowdfunding

SeedOn is using smart contract technology to create a blockchain-based escrow system for crowdfunding platforms.SeedOn is a crowdfunding platform

125. The Massive Uber Hack: Technical and Legal Implications

In this article, I analyze the technical and legal implications of post-data breach, the risks & possible exonerations in the eyes of extent laws & regulations.

126. Hacking Your Way Through Microservice Architecture

With an emerging pattern of organizations embracing the DevOps framework, adopting Microservice Architecture is steadily gaining the respect it deserves.

127. IT Audit | Step-by-Step Guide

In 2020, an IT audit is important for all organizations. It provides insights into the business’ IT infrastructure and how it can be improved.

128. How Facebook tracks you on Android (even if you don't have a Facebook account)

Suppose you’ve picked up an Android phone on the street and you saw the 4 apps above. Can you guess the profile of the phone user?

129. 5 Most Vulnerable Industries for Data Breaches in 2018

In February 2018, the Under Armour hack turned out to be one of the biggest data breaches in history, affecting over 150,000,000 users. The sheer number of victims made it, at the time, a record-breaking data theft, but what's really disturbing about this incident?

130. The 4 Main Types of Data Breaches: Definition and Examples

A data breach is a serious security violation; unfortunately, it can happen to the best of us. Let’s learn and keep aware of it together.

131. How To Enhance Website Security

Enhancing security for a website can save it from hackers and online attackers. Read this article about website security to learn more.

132. Startup Interview with Niels Klitsgaard, CEO & co-founder, FortKnoxster, Gibraltar

Our company is called FortKnoxster. We are a cybersecurity company focused on the crypto space.

133. 6 Popular Software Testing Trends Everyone Should Follow

134. 8 Crucial Tips for Hardening PostgreSQL 14.4 servers in 2022

As of July 13th, 2022, there are 135 security flaws reported to the CVE database. Here are 8 essential measures you can take to protect your PostgreSQL server.

135. How to Detect if an iOS Device is Jailbroken

Thanks to the mobile era we have mobile apps for everything these days. Every business from a barber shop to huge retailers has apps so that they can be closer to their customers. On one hand, we really leverage this convenience but on the other hand, there are risks of exposing a lot of confidential information while using these apps. And it becomes very vital when dealing with payments and other sensitive information.

136. What is Purple Teaming in Cybersecurity?

Purple teaming is maximizes the effectiveness of the Red and Blue team. It is a function that encourages the two teams to work together, exchange information.

137. The Basics of Hacking: Part 2

Let’s rock and roll. Below we have a C-program designed to accept and print command line arguments:

138. CloudEye Turns Out To Be A Front For Hackers spreading GuLoader

Conservative estimates put company’s monthly income at a minimum $500,000.

139. How to Secure Your Software: 10 Takeaways for Software Developers

Find out which secure programming practices you should follow as a software developer to protect your software from vulnerabilities and attacks.

140. How To Build a Comprehensive Cybersecurity Strategy

Is your business equipped to take on the escalating security threats of the digital age? If not, then a smart strategy is needed. Recent reports state that half of the businesses in the United States have reported a data breach.

141. An Introduction to Firefox’s new Site Isolation Security Architecture

Without Site Isolation, Firefox might load a malicious site in the same process as a site that is handling sensitive information.

142. Story Behind Spoyl Data Leak

What’s Up Hackernoon Community, It’s Sayaan Alam and I’m not perfect in doing write-ups, Please Ignore Mistakes...

143. An Insecure Pillar in Cybersecurity

From Caesar's cipher to RSA. A deep dive into the inner workings of modern cryptography and its potential crumbling.

144. How to Use Zero Trust Framework for API Security

This post is an introduction to how to map the requirements of API Security, from Defense-in-Depth to Zero Trust Model.

145. Your Website Knows Where Your Users Are—But Is It Keeping That Data Secret?

It’s one thing to share user geolocation data deliberately without consent, but what if you’re inadvertently giving it away?

146. DNS Queries Explained

DNS is a topic often considered difficult to understand, but the basic workings are actually not hard to grasp. The first fundamental point to grasp is that every domain in existence is linked to an Internet Protocol (IP) address.

147. Biting Back Against Phishers

How one company learned to deal with Phishing attempts that tried to compromise their cybersecurity system and how they learned to fight back against them.

148. Should You Block All Monero-Related Domains? Crypto Scams Set To Rise in 2022

Crypto-related cyber attacks will increase in 2022, and outpacing what we've seen in 2021. In particular, Monero cryptocurrency is used often by cybercriminals.

149. Third-Party Risk Management: What About Domains and Subdomains?

Both physical and digital supply chains have undeniably become more populated with third parties. Virtually all organizations work with different software providers, use one or more payment processors, and avail of web hosting services and cloud solutions from external parties. Companies that manufacture physical products also need to employ the services of courier companies.

150. Cloud Security Observability: Get Set, Go!

The cloud security observability approach involves applying the observability concepts to cloud security operations to gain insights into the health of an app.

151. Hiding Your API Credentials Client Side Using a Proxy Server in React

When you're writing client-side code to make API requests, you might need a Proxy Server to hide your API Credentials. Let's see how to do this for React apps.

152. What is the Cryptocurrency Security Standard (CCSS)?

The Cryptocurrency Security Standard (CCSS) appears to be a control framework, with ten controls and three implementation tiers.

153. 5 Common Identity and Access Management Security Risks

IAM ensures that employees have the necessary permissions to perform their jobs. Read on to learn about the 5 common IAM security risks & how to mitigate them.

154. Real-Life Software Security Vulnerabilities And What You Can Do To Stay Safe

Most important aspects of our life including our finance, identity, and healthcare now depend on code. Software security is now a critical aspect for not just companies, but individuals as well.

155. An Invitation to Hack Microsoft’s Azure Security Lab.

Disclaimer: I am not sponsored by anyway from Microsoft's Azure Team.

156. Check Point Security Breach: A Leading Cybersecurity Company Has Been Breached

Check Point, which bills itself as the leader in cybersecurity solutions, has been breached. Data records of over 5k ZoneAlarm forum users have been hacked.

157. Network Security: Things Most People Don’t Think About

There are a lot of things most people do not think about that can dramatically increase the level of security on a network

158. Quantum-resistant Encryption: Why You Urgently Need it

The Second World War brought to the front burner the world of espionage, which is the precursor of cybersecurity, as is seen in the modern world. Technological advancements such as the quantum computer necessitate that we take the war against cybercrimes to another level.

159. A Guide to Doing a Digital Forensics Examination on Digital Media (USB)

Digital forensic plays a major role in forensic science. It’s a combination of people, process, technology, and law.

160. Cloud Phishing: New Tricks and the Crown Jewel

Cloud Computing gives phishers a new playground. This article is about Cloud Phishing — whether using the Cloud to do it or targeting the Cloud.

161. What will IBM's Acquisition of Randori Mean for Cybersecurity?

IBM announced plans to acquire a leading attack surface management provider and offensive security company Randori.

162. How to Tell If Someone Hacked Your Active Directory

The latest cybersecurity reports show that more breaches in the current day are done through credential leaks done through an active directory compromise

163. Your USB Gadget Could Be Weaponized

Cybersecurity experts have been warning us for years about using USB devices. We look at how an ordinary USB-powered device can be easily weaponized.

164. Learning The Basics Of Identity and Access Management

IAM is a collective term that covers merchandise, processes, and policies for managing user identities and regulating user access in the company.

165. 9 Essential Factors to Consider Before You Install A Security System

In the US, a burglary happens every 23 seconds on average. This number is even higher in developing countries.

166. How To Create a Complex Password

For almost all the accounts that you create on the Internet, you need to come up with a secure, that is, a complex password. Choosing the most secure password requires the use of unlikely combinations of letters and numbers. Fortunately, creating a complex and at the same time easy to remember password is a task that you can handle. To learn how to create a password correctly, use our tips.

167. FinTech Cybersecurity: How 'Capital One' Could Have Avoided a Data Breach

Even after investing heavily in securing IT infrastructure and developing security tools with AWS, Capital One failed to avoid data breaches. Here's why.

168. Zero Trust Network in the Cloud: From Traditional Security Perimeter to Software-Defined Perimeter

A security perimeter used to be the area inside a demarcation line separating the outside, deemed unsafe, or untrusted, from the inside, deemed safe, or trusted.

169. Social Engineering Attacks [Infographic]

Over the years, social engineering assaults have been a regular phenomenon against companies. It has become more and more sophisticated.

170. Do I Need A Degree To Become A Cybersecurity Professional?

Do you need a degree to get started in cybersecurity? And do you need a degree to progress in cybersecurity? The answer is both yes and no.

171. Myths and Misconceptions About Private Browsing

Many people who use private browsing incorrectly believe they're protected. Private Browsing doesn't make you anonymous.

172. A Comprehensive Guide to OpenAPI Specification

OpenAPI Specification (formerly Swagger Specification) is an API description format for REST APIs. An OpenAPI file allows you to describe your entire API.

173. Why Startups aren't Using Ethereum

This interview talks about the rising ethereum transaction fees, cross-fi staking and cybersecurity for blockchain startups.

174. Seven things that slow down your VPN and What You Can Do About It

Those accustomed to Virtual Private Networks probably know what a painful experience is slow connection speed. Paradoxically, VPNs are the #1 go-to software when talking about torrenting (where speed matters a lot), yet, due to their technicality, some sort of a speed drop is inevitable.

175. 7 Steps to a Winning Cloud Migration Strategy

Cloud computing has revolutionized IT since the 2000’s, and this revolution is far from over. Formerly, organizations would host their data on-premise as that was the only option available, but with the advancement in technology, and fast-changing business demands, cloud-based solutions started turning out to be a more flexible and powerful option for organizations. There is a mass migration underway to adopt cloud infrastructure and avoid the hassles and operational costs of managing infrastructure in-house.

176. Hackers Target Centralization, So DeFi Should Stick To Its Own Game

DeFi holds much promise as a novel financial system, but from the security perspective, its main flaw is that it's not as decentralized as we think.

177. How Cryptojacking Hackers use Phishing and Software Vulnerabilities To Mine Crypto On Your Machines

One way hackers can profit is crypto-jacking: they use social engineering and hacking to put the mining script on the victim's device and exploit its resources.

178. Mitigating the DDOS Threats Facing Banks and Fintechs

As much as digitization and cyber simplified banking, the Fintech sector has left digital payment activity exposed to malicious and suspicious activity.

179. Top Open Source Vulnerabilities to Watch Out

Open Source packages are a mainstay for most software engineering projects. We are so accustomed as developers to run our npm install (for Node developers) or

180. 6 Expert Cybersecurity Strategies for Financial Institutions

Investing in security is vital, but major breaches still happen irrespective of advancements. Financial organizations can take these 6 steps to better security.

181. 3 Types of Phishing Attacks and How to Prevent Them

Phishing is a form of social engineering and is one of the popular social engineering attacks. A variety of phishing attacks are used to obtain sensitive data.

182. Machine Learning for Fraud Prevention

Machine Learning aids e-commerce to foil attempts at payment fraud, as they happen.

183. Securing Cryptocurrency: The Priority for Tech Firms in 2020

One of the persistent issues holding back the mainstream acceptance of cryptocurrencies is fears about asset security. Once lauded as unhackable,' it has now been proven that it is possible to steal digital coins and tokens from people who own them. Regardless of the process by which it is happening, that is all that really matters to the victim.

184. Delete Your Old Tweets: 90% of Employers Consider Your Social Media Activity When Hiring

A survey shows that 90% of employers consider your social media activity when hiring and a whopping 79% of HR have rejected a candidate because of social media.

185. Understanding Lateral Movement and How to Detect It

Lateral movement broadly applies to an attacker’s activity within the network after penetrating perimeter defenses, using various tactics and techniques.

186. The Importance for Cyber Security in Investment Banking Industry

Today, finding the best investments takes more than looking for market leaders. The investors today look for companies that has secure systems apart from profit generation, huge market share, strong growth potential, or a reasonable valuation. cybersecurity is a crucial growth-oriented strategy for their portfolio.

187. Using AI for Fraud Detection

Just as your average cyberattack has grown more sophisticated, so have the avenues for fraud. To keep up with these threats, we can use AI for better detection.

188. Cybersecurity in The Post-Pandemic Economy

COVID-19 has brought millions of people onto the internet for much longer stretches of time. These new practices and habits on such a large scale is bringing new weak links in the chain that keeps us safe on the internet. Huge amounts of growth of work from home tech, online cloud services, and customer facing networks are starting to open doors for cyberattackers to walk in.

189. Best Physical Security Practices for Your Server Room

Your server room hosts your most important assets, so it deserves proper protection. Here are four physical security strategies to keep your server room secure.

190. Kubernetes Security For Developers: A Quick Start Guide

One of the basics of running Kubernetes in a production environment is security—how to ensure container images, pods, specific microservices, are protected.

191. Expert Hacking Techniques For Hackers in 2021

Today I will tell you about various types of hacking techniques, and out of these, I will focus more on password hacking. There is no fixed classification of hacking, but I will tell you all the techniques that I remember. It is not possible to tell completely about all Hacking Techniques, so I will give you all the basic knowledge.

192. What is Cyber Range Training and Simulation in the Cloud?

Cyber range simulations help create resiliency by enabling companies in an actual situation to stress-test through Cloud computing. With tabletop drills or classroom instructors we need immersive funds to support situational awareness in a way that is very difficult to duplicate. Cloud Simulation contributes to experience on-the-ground and provides various advantages, including statistical information, input from real-time experts, and cross-functional coaching. There are potentially many challenges with the on-site classrooms based on several experts:

193. Analyzing The NotPetya Malware, Cloud Computing, And Cybersecurity Risks

In June 2017, a variant of the Petya malware worm, NotPetya, wreaked global havoc. Global enterprise networks from Ukraine to the shores of New Jersey’s commercial shipping depots were eviscerated.

194. Biometric Security Is the Only Truly Secure MFA Option Left

The latest advancements in biometric authentication bulletproof the flaws of multifactor authentication.

195. What is Zero-Knowledge Proof ?

Let’s explain exactly what that term means in one sentence:

196. Protect Your Crypto Wallets With InfoSec - The Three-Tier Wallet System and Crypto-Hygiene

Securing your wallets is essential when protecting digital assets against cyberattacks. Let me share how to use cybersecurity skills to boost crypto-security!

197. What You Should Learn Before Learning Cybersecurity - Updated 2022

Have you been looking to learn Cybersecurity but you’re unsure where to start from?

Here’s a great guide on where to start!

198. 10 Emerging Technologies to Look out for in 2021

Let's talk about the top 10 growing tech of 2021. All the technologies hold tremendous potential and offer promising career opportunities.

199. The 5 Things Businesses Need to Know to Stop Online Fraud!

The 5 Things Businesses Need to Know to Stop Online Fraud!

200. Tips To Protect Cryptocurrency From Cyber Attacks

Cyberattacks are common in the online world that disrupt the entire online channels. Read precautionary measures to protect the crypto from cyberattacks.

201. What Does the Future Hold for Cloud Security?

Cloud security is something that every business needs to take seriously. In fact, ignoring cloud security could prove to be a fatal move for many organizations.

202. How to Protect Kubernetes Clusters from Cyberthreats

Uncovering the importance of the role of authentication and user control provided by Kubernetes to bolster the best security practices

203. VPN Leaks that Threaten Your Online Privacy Daily

According to research by GlobalWebIndex, in 2018, around 25% of Internet users have used a VPN service. There are several reasons for this spike in popularity, which you can read about in my previous article. One of the main reasons is the ability to bypass geo-blocks and gain access to, for example, a full Netflix library.

204. Cyber Deterrence is More Important than Nuclear Deterrence

Sleep Tight - It Ain’t Gonna Be A Nuclear Fight!

205. Cyber Attack Prevention: 5 First Principles for Your Incident Response Plan

Today, organizations rely heavily on the IT systems for their day to day business operations. Regardless of how big or small the business is, it is vital to secure these systems and their data. With the inherent complexities of these IT systems and networks, they become vulnerable to attacks. This makes it vital for any business to prepare a solid incident response plan and continuously improve it to be highly effective.

206. How to Prevent Juice Jacking

Juice jacking occurs when a hacker has infected a USB port with some form of malware or other harmful software.

207. Command and Control Frameworks in a Nutshell

A glimpse over Command and Control attacks and frameworks, how they happen, and how they can affect our daily lives.

208. VPNs are the Heroes of Our Time

If you don’t like the way social media and other sites track you online ( and even offline), you should try a VPN.

[209. CyberSec Games Part I:

Backdoors & Breaches](https://hackernoon.com/cybersec-games-part-i-backdoors-and-breaches-96393b0z) Backdoors & Breaches is an Incident Response Card Game that contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods.

210. Pegasus Spyware: Here’s What You Need to Know

Pegasus is a spyware that was developed by an Israeli group called NSO. Once the spyware infiltrates the mobile device, it can monitor the device in real time.

211. The Cybersecurity Writing Contest 2022: Round 4 Results Announced!

Hackers, Welcome back! Here we are again with the fourth round of the Cybersecurity Writing Contest result announcement by Twingate & HackerNoon!

212. Top Resources to Learn Ethical Hacking

In this article, I will list the best resources all over the internet which will help you to be a hacker yourself.

213. Using Macros and Emulation Voodoo to Solve a Crackme

This time I’m tackling this beautiful crackme, the third of the series. To solve this we will use radare2’s macros and unicorn emulation. Let’s jump right in!

214. Why Cyber Security Should Be Your Company’s Top Priority In 2020

As business is increasingly conducted through online interactions and digital exchanges of data and information, the importance of cyber security for companies grows by the minute. The influence of the advancement of technology has contributed to increased efficiency and productivity alongside a host of new dangers and vulnerabilities that can be taken advantage of by malicious users. In order to address these concerns, security needs to continually evolve to be able to effectively respond to new risks and methods of attack that are developed. To get a better idea of why you should make improving cyber security one of your top priorities moving forward, take a look at the points given below.

215. This Is Why I left Machine Learning for Cybersecurity

Well, this is my first ever published content. I am a writer; I write academic content, sometimes technical articles. I can say this is more of a personal opinion than a statistically analyzed interpretation.

216. Facial Recognition Login: Is This The New Security Standard?

Facial recognition could help your business enhance security standards 10X. We explore the business challenges the technology can solve.Thirty thousand. That’s the number of infrared dots used by the latest standard today to create a map of your face for authentication and enable you to securely access your device. The process is as simple as it can get - look right into the camera and the facial login system does the rest. Today, facial recognition login isn’t restricted to unlocking phones, tagging people on social media or scanning crowds for security threats. It’s made its way into gaming, grocery stores, airports and payment platforms. Facial recognition login software and biometric technology are making inroads into building robust security platforms - with a system that’s designed to prevent spoofing by masks or photos. It’s permeated into security and law enforcement, even making paperless travel a reality.

217. Security of a Cold Wallet

In today's FinTech landscape, security has become perhaps the most important issue due to the increasing incidents of ransomware and hacking attacks. Cyber security threats and vulnerabilities extend to third parties, employees, government organizations, business units and, especially, to emerging technologies.

218. Uber's Safety Woes In London Highlight The Critical Need For Stronger Authentication

For the second time, Uber is without a license in London.

219. Protect Angular Code Against Theft and Reverse-Engineering

In this step-by-step guide, you'll learn how to protect your Angular code from being stolen or reverse-engineered, by leveraging the power of Jscrambler.

220. What is a DNS Attack and How Can You Protect Against It?

DNS is a protocol that translates human-friendly URLs into IP addresses and a DNS attack is when a hacker exploits vulnerabilities in the DNS service itself.

221. Disinformation-as-a-Service: Content Marketing’s Evil Twin

Are you tired of all the BS out there on the internet? It's about to get A LOT worse. Dirt-cheap disinformation-as-a-Service campaigns are a thing now.

222. Have You Contacted Your Reps to Help Block the EARN IT Act Yet?

As the world finds itself preoccupied with COVID-19, the United States government is trying to pass a law to ban encryption. It's called the EARN IT act, and while it claims to combat the sexual exploitation of children online, it has potentially devastating repercussions for encryption and companies that use it to protect your privacy online.

223. How Can I Tell if My Steam Account Has Been Hacked? (and How to Recover It)

his time, I would like to focus on Steam account security, which has recently gotten some attention in the community after waves of phishing attacks.

224. Ransomware-as-a-Service: SaaS' Evil Twin

This article will educate you about RaaS groups and protective measures against ransomware attacks.

225. Top Emerging Cybersecurity Threats and How to Prevent Them From Happening to You

The fact is cybercrime is exponentially increasing. For all security threats, technical literacy and awareness are essential to protect yourself from such crime

226. 5 Tips to Promote CyberSecurity Awareness in Your Organization

Two things that matter most in any business are quality and security,especially when it comes to the digital world. In the hi-techenvironment, everything is fascinating - from innovating to introducingnew technologies and tools.

227. An Intro to Zero Trust Architecture

Zero Trust isn’t a new concept. It was first presented in 2009 by John Kindervag, a former principal analyst at Forrester Research.

228. Building the Network for the WFH Future

A look at building the network of the future for the flexible work revolution

229. I Tried Hacking a Bluetooth Speaker - Here's What Happened Next

In this article, we’ll attempt to hack a Bluetooth speaker using my knowledge of CyberSecurity.

230. Scan Kubernetes RBAC with Kubescape and Kubiscan

Exploring Kubernetes ecosystem tools like Kubiscan and Kubescape to scan and evaluate RBAC model of GKE cluster.

231. Critical Security Update: Coinbase Security Team Discovers Zero-Day Exploit in Firefox

Zero-Day Exploit Found Targeting Crypto-Users

232. WhatsApp Privacy Policy: Everything You Need to Know

WhatsApp Privacy Policy update caused backlash to the company and led many users to switch over to alternative messaging applications like Signal and Telegram.

233. How to Set Up Portable VirtualBox With Kali Linux

This a short tutorial on setting up Portable Virtualbox with Kali Linux.

234. British Cybersecurity Firm Darktrace Goes Public

Darktrace affirmed on Monday that it intended to float on the London Stock Exchange to raise new funds and for the acceleration of product development.

235. 4 Entry Points for Cyberattacks While Working from Home

Family relationships, friendships, acquaintanceship, and romantic relationships are the different types of relationships that you may be involved in. Any or all of them can greatly impact your productivity and also constitute cyber threats while working from home.

236. Why Network Security is an Integral Part of Any Internet-Connected Business

Network security is vital for any internet-connected company. Without it, hackers can steal all the data the business has. Bad network security causes problems

237. YARA Rules in a Nutshell

YARA rules can be used to help researchers identify and classify malware samples. They are beneficial for reverse engineering or during an incident response.

238. Are Macs Safer than Windows PCs? - Tech Myths Busted

The idea that Macs are safer than Windows PCs is a severe misconception among a large ratio of individuals

239. Exploiting the proftpd Linux Server

Did you ever wonder how a hacker can compromise a system? This Behind the Scenes (BTS) walkthrough takes us through a possible scenario using a known exploit.

240. How to buy Crypton (CRP) Utopia P2P project cryptocurrency?

Table of Content

241. Infamous Cryptocurrency Hacks that Shook the Crypto World

The intention of this article is not to scare anyone away from cryptocurrencies but instead to educate readers on why these attacks happened.

242. How 5 Massive Data Breaches Could Have Been Prevented

One of the biggest losses for companies? Inadequate cybersecurity.

243. The “Connection Not Private” Warning Explained

Each time you visit a website, your web browser (e.g., Chrome, Safari, or Firefox) first checks for the existence of one of two digital certificates

244. Investing in Cybersecurity to Build a Successful Exchange - With Ben Zhou, CEO at Bybit

Investing in critical infrastructure is the key to building a successful digital exchange. In this interview, we talk about regulations and cybersecurity.

245. How to Get a Job in Cybersecurity 

Good mentors, and a willingness to take opportunities that come up (and abandon those that aren't working out) can take you a long way in a career.

246. True Hackers and the Monsters we Invent

Common misconceptions about hacking that makes you vulnerable and how to avoid them.

247. Cybersecurity and Physical Security Are Not Separate Matters

During the pandemic, the incidence of cybercrime attacks increased dramatically. According to the FBI, cybercrimes such as spear-phishing rose by a staggering 300 percent.

248. Exploiting Covert Channels in WhatsApp and Other Android Messenger Apps

Covert communication channels are rampant in messenger applications and here is one example...

249. What is DevSecOps? - 7 Best Practices for Effective Automation in 2021

DevSecOps is the theory of incorporating security activities within the process of DevOps.

250. How to Create an Effective Incident Response Plan

When it comes to security incidents, it’s not a question of if, but when they will happen. 80% of organizations say that they have experienced some kind of cybersecurity incident in the last year. With this in mind, it’s essential to have a security incident response plan in place before you need one.

251. Blueprint of an EFSS Phishing Attack

Cybersecurity is a high-stakes game. The effects of a data breach can echo for years, as companies become associated with being poor managers of personal data. In spite of the risks, the benefits of enterprise file sync and sharing (EFSS) services remain clear: enterprise organizations and SMBs alike can use cloud-based solutions to easily synchronize and share documents.

252. The CRITICAL Log4j Java Vulnerability: How to Detect and Mitigate It

CVE-2021–44228 (Log4Shell) is an unauthenticated Remote Code Execution(RCE) vulnerability & 0-day exploit which allows an attacker to take over a system

253. How to Protect Your Privacy From Hackers

Web accounts are really easy to hack. All that the process really needs is patience.

254. IP Geolocation in Cybersecurity Investigations

In a world where illegal activities increasingly take place through digital means, cyber perpetrators often remain steps ahead in sophistication compared to those who are chasing after them.

255. When Did Cyber Security Start?

Cybersecurity began between 1970 and 1972 with the publications of the Ware and Anderson reports. The Ware Report set out a number of different security control

256. Rising WordPress Cyber Attacks: 7 Tips For Keeping Your Website Secure

Instances of cyberattacks, especially those targeting WordPress websites, are on the rise across the internet. The most recent attack to hit WordPress users affected some 700,000 sites running a vulnerable plugin.

257. Fetch.ai Releases DabbaFlow: Encrypted File Sharing Platform for Secure Data Transfers

DabbaFlow, an end-to-end encrypted file-sharing platform developed by Fetch.ai, a Cambridge-based artificial intelligence lab, was launched recently.

258. Tips to Ensure the Prevention of Spoofing, Phishing, and Spam in Google Workspace

With increasing dependency on the web and modernization of the industries moving to the cloud, data security and vulnerability to scams have become a major poin

259. It's Zero-click! Pegasus Attack Don't Need Human Action

Pegasus is the most sophisticated attack to date.

260. 3 Tips on How to Stay Safe in Your Everyday Cyber Life

Remember your mom always repeating "stay safe" phrase? Well, you should stay safe! Not only in streets, but also in cyberspace.

261. It’s time for cybersecurity degree programs to get more hands-on

Too often, employers find that recent college grads with cybersecurity and IT degrees lack practical skills. It's time to make the curriculum more hands-on.

262. Web Application Penetration Testing: A Complete Guide

Your website can be the next ‘target’ if you don’t take the necessary steps to secure it. One of the most appropriate step is to conduct a penetration testing.

263. A New LinkedIn Vulnerability Exposes Jobseekers to Phishing Attacks

The latest LinkedIn vulnerability can be exploited by con artists for massive phishing attacks, identity theft, and employment-related scams.

264. Understanding Pegasus: How to Trace the Untraceable

Pegasus is a spyware that is developed, marketed, and licensed to governments worldwide by the Israeli cyber-surveillance company NSO Group.

265. The Looming Threat of Ransomware [Infographic]

A look at how to prevent ransomware before it happens.

266. Harmony's Horizon Bridge Attack: How $100M was Siphoned Off By a Hacker

The attack was successful because two validators' private keys were suspected to be compromised.

267. Badger Dao Interface Hack: Do We Need to Panic?

The Badger DAO attack was conceptually very different from the more traditional attack in DeFi. Those traditional ones are aimed at exploiting vulnerabilities in the code of smart contracts of the protocols, otherwise called bugs. We are familiar with flash loan attacks that use uncollateralised loans across a multitude of protocols to manipulate certain markets and pump-and-dump certain assets. We also know about reentrancy attacks that exploit the logic of execution of functions inside a smart contract. However, the Badger DAO exploit was both more and less ingenious at once.

268. Formjacking Attacks: Defention and How To Prevent It

Formjacking attacks are designed to steal financial details from payment forms. Learn how it affects your business and tips to prevent a formjacking attack.

269. A Simple Cybersecurity Guide for The Hopelessly Confused

If you’re one of these three bands, here is a simple, quick cybersecurity guide based on 5 tips that can help you preserve your digital privacy.

270. Your Resident McAfee Engineer on Cybersecurity, AI, and Career Growth

Hey! I'm a Software Dev Engineer at McAfee Enterprise; nominated for four 2021 Noonies by writing about Authentication, Remote work, Covid, and Remote Teams.

271. You'll Probably Be Exposed To These 5 Cybersecurity Threats In 2021

How to prepare yourself to face the Cybersecurity Threats in the year ahead? Check out the top 5 of the most expected attacks in 2021.

272. 51% Attacks Pose the Biggest Threat to Smaller Mining-Based Cryptocurrencies

A 51% attack is where an actor controlled over half of the mining power in order to reverse transactions and compromise the security of the network.

273. From Passwords to Passwordless Authentication

Passwordless authentication is gradually replacing the password-based authentication practice. The CIA triad of Cybersecurity is changing rapidly. Learn how.

274. The Best Way to Protect Your Data: Continuous Security Validation

Security validation is a cybersecurity method that provides companies with an extensive security report on what could happen if they suffer from a cyberattack.

275. Taking a Risk-Based Approach to Cybersecurity

Using a risk-based approach to cybersecurity means that ensuring your security team is essentially concerned about the reduction of your security vulnerability.

276. My Wireless Router is Better than Yours

In other posts I have covered the step-by-step process on how to uncover a hidden SSID, both by just listening to the network channel, or by causing a de-authentication attack. In those articles I assumed that you already had a wireless USB adapter capable of going into monitor mode and also capable of injecting packets.

277. 5 Types of Cyber Security and Why It’s Important to be Aware of Them

Cybersecurity is the process of protecting systems, networks, and programs from malicious attacks. But why is it important? Let’s find out.

278. Lay a strong foundation by writing secure C and C++ utilities

Libraries and system utilities form the foundations on which larger projects are built. So it's critical to make sure they, in particular, are secure. That's why we recently introduced five new rules for C++ and C to detect broken authentication and access control in *nix systems. The new rules fall into three categories: account validity, granting permissions, and changing directories.

279. How Biometrics can Prevent Identity Theft in the Metaverse

Learn how biometrics technologies help us safely enter the metaverse era

280. How do Hackers Hide Themselves? - A Guide to Staying Anonymous Online

The world has always been fascinated with Hackers. In this video, we’ll learn about how they hide themselves online.

281. Understanding The Importance of SOC2 Compliance for Data Centers

Businesses rely on Data Center SOC2 Audit Reports for critical business decisions concerning outsourcing services. It helps customers build a sense of trust.

282. I'm Building A Browser With No-DNS Protocol Built With A Decentralized And Zero-Trust Approach

Dappy is a first of its kind ultra-secure web browser and name system. It is a no-DNS protocol that has been built with a decentralized and zero-trust approach

283. How to Make a Malicious USB Device and Have Some Harmless Fun

Make an inexpensive BadUSB from an old USB drive and learn about Windows shortcut files and how malicious actors are using .lnk files to spread malware.

284. Cybersecurity Is No Longer "Optional" 

Security breaches can cost businesses millions of dollars. It's high time businesses start to realize the importance of cybersecurity strategies.

285. Has Solana Encountered Another DDoS Attack?

According to recent reports that have emerged on January 4th, the Solana network has been hit by a DDoS attack.

286. Harnessing the Power of ChatGPT for OSINT: A Practical Guide to Your AI OSINT Assistant

If you're like most security practitioners, you're always on the lookout for new tools and techniques to help you gather intelligence. ChatGPT is one of those n

287. Crypto Wallets Exposed "Mnemonic Phrase Vulnerabilities" (4 Already Fixed)

MetaMask and Phantom said today that they had patched a security flaw that could, in some cases, allow attackers to obtain mnemonic phrases.

288. Uncover the 7 Best Security Sites on the Internet

In this article, we’re going to cover 7 of the best security sites on the internet.

289. $275M Research: How was KuCoin, One of the Largest Crypto Exchanges, Hacked?

Over the last couple weeks, the hottest crypto market topic was the KuCoin Hack. Hacken Group, the major cryptocurrency exchanges auditor, highly values the need for user awareness of the threats. The issue of preventing such situations is of greater importance at the moment. Therefore, we present the research that was carried out by Hacken specialists. Read the recommendations on what to pay attention to and what to do to avoid such attacks.

290. How to Crack a Password Using Hashcat

In this article, I discuss the best ways to crack passwords.

291. Is Facebook Putting Digital Identity At Risk With Libra? Here’s Why It Raises Privacy Concerns

Last month, Facebook finally disclosed details of its much-hyped cryptocurrency, Libra. After generating an immense amount of chatter, the company announced that the digital currency, set to launch in 2020, will enable people to buy things or send money to others with almost zero fees.

292. Balancing Cybersecurity Risk with Technological Innovation: Using Policy as Code

The costs of security events are often far-reaching. Shifting security left to using policy as code can help to ensure security.

293. Women in Cybersecurity: How Diversity Can Help Combat Cyber Threats

Gender diversity can help build a workplace where people are unafraid to speak up and bring their experiences to the table to tackle a problem as a team.

294. How the Quantum Computer will Change our Lives

The countdown has now begun. For some it will take 15 years, for others it will only take 10, but the quantum computer is a near reality and is likely to bring about a huge change in the history of mankind.

295. Lessons Learned From SolarWinds: Defensive Strategy Against Novel Malware

SolarWinds, a leading provider of IT monitoring and management solutions for enterprises, disclosed that it had fallen prey to a widespread supply chain attack

296. Maliciously Manipulate Storage Variables in Solidity [A How-To Guide]

Smart contracts, in general, offer the ability to determine factors and expectations set out by the contract. In the field of programming, factors and expectations can be described as ‘variables’ and ‘conditions’ within the actual code.

297. Is a ZeroTime/Zero-Trust Approach the Perfect Cybersecurity Model?

Many people are familiar with zero-trust network security, which is the assumption of a default state suspicion until authenticated access is granted to network resources. Much less know about zero-time security.

298. What is Threat Modeling and Why Should you Care?

Threat modeling is typically conducted from the design phase and onward in the development process.

299. Crypto Fraud New Tricks: Victim's MetaMask Wallet Emptied by Resetting Apple ID

By tricking victims into resetting their Apple ID and obtaining a 2FA one-time verification code, the scammers could access their MetaMask and drain the funds.

300. Do you Need to be Great at Math to Start a Career In Cybersecurity?

Do you really need to be great at Math to have a career in CyberSecurity? Find out more in this YouTube video from CyberSecurity Engineer - Grant Collins.

301. Top 9 Security Practices at Kubernetes in 2020

In January 2019, Kubernetes, the world's most popular container orchestration system, discovered the first major security vulnerability that hit the project’s ecosystem. Vulnerability CVE-2018-1002105 allows attackers to compromise clusters via the Kubernetes API server, which allows malicious code to be executed to install malware, etc.

302. Protecting Your React.js Source Code with Jscrambler

In this step-by-step guide, you'll learn how to protect your React.js application with Jscrambler to prevent code theft and reverse engineering.

303. How to Protect Yourself From Sim Swap Attacks

If they can get Jack Dorsey they can get you… learn the simple ways to protect yourself against Sim Swapping Attacks.

304. 3 Key Takeaways from Biden’s Cybersecurity Executive Order

Learn more about the consequences of Biden's Executive Order on Improving the Nation’s Cybersecurity on software vendors and government contractors.

305. How To Protect Your Data Against Credit Card Breaches

Save your credit card information from being hacked by following these tips.

306. HackerOne Finds Massive Security Failure In PayPal’s Login Compartment

In today’s highly digitized environment, the capabilities to change our lives for the better are virtually endless. The cooperation of humans and technology - be it hardware of software - has made our lives easier and more productive.

307. Using Hashcat Tool for Microsoft Active Directory Password Analysis and Cracking

Let's conduct a penetration testing on a file with a detailed study analysis of system passwords as part of an ethical hacking engagement.

308. America's Strangest Unsolved TV-Hack and The Story Behind It

In 1987, an unknown hacker hacked evening news with Dan Roan on local WGN-TV and later WTTW. A person wore aMax Headroom mask and gave birth to Wyoming incident

309. How To Protect Your Company In The Quantum Computing Age

Quantum computing and the future of enterprise security

310. Dissecting Poly Network Hack: What Really Happened

The Poly Network cyber attack that has been the largest hack of all time in the cryptocurrency market saw $611 million worth of Bitcoin, Ethereum and USDT. The network is a cross-chain bridge connecting Ethereum, Binance Smart Chain and Polygon Network. The attack produced a host of catchy headlines and more than one version of what happened, some of which contradict each other. But there are still more questions than clear answers.

311. How to Prepare Against Sophisticated Cyber Attacks

Get to grips with the principle of planning, which is critical to any advanced operation, especially in the case of a serious cyber conflict

312. OWASP Top 14 Security Practices For Software Developers

★ The objective of this guide is to provide a comprehensive review of the security principles with limited scope in terms of information. The primary goal of the software developing team is to use the available information resource to provide and build secure applications for your business and software operations. It could be obtained through the industry-standard implementation of security controls.

313. Network Security 101: Everything You Need to Know

Network Security is Vital. Its purpose is to prevent unauthorized users from accessing an organization's network and devices. It is intended to keep data safe.

314. The Security Issues in Using Public Wi-Fi  —  “Honeypots” And “Pineapples”

It is a warm and sunny afternoon on a weekend. This is a good time to head to a cafe to chill for a bit with a coffee and pastry. It is also perfect for some web surfing using the free Wi-Fi service. The next thing you would need to know is the Wi-Fi access point (i.e. hotspot) and password. Now you are all set and connect to the Internet. For the average user this is fine, but for cybersecurity experts there is a risk to using free Wi-Fi services.

315. 6 Most Common Job Titles in Cybersecurity

Honestly speaking the word Cyber security professional sounds kind of cool as well. However, if you’re willing to become a Cyber security professional yourself

316. How to Create Your Own Dark Website (.onion) on Linux

As we know dark websites use .onion for their domain extension.

317. Web3 Security: Tips to Protect Yourself and Your Crypto Wallet from Hackers

Due to the decentralized nature of the web3, cybersecurity becomes a major concern when protecting your non-custodial wallet on decentralized exchanges.

318. How KYC API Solves Identity Theft Problems in Finance

How financial institutions can use API KYC curb the growing threat of cyber identity theft and proactive measures for individuals to prevent cyberattacks.

319. 10 Types of IT Services Your Business Can Provide

You know your way around a computer, and you’ve got some capital to invest in new business. Start an IT company – easy right? Well, maybe not. It used to be enough to just be “good with tech” but today, businesses require specialist tech support for their industries and bespoke IT support tailored to the particulars of their business. If you’re thinking of starting your own IT business, here are a variety of services you could specialize in, but to be a truly comprehensive managed IT support provider you should have competency in all of them.

320. Machine Learning in Cybersecurity: 5 Real-Life Examples

From real-time cybercrime mapping to penetration testing, machine learning has become a crucial part of cybersecurity. Here's how.

321. Working From Home & Cybersecurity in The Time of The Coronavirus

The recent COVID-19 outbreak has taken the world to storm and demands for several instant changes both in the social and business world. Employees are now directed to work from home and here come some major issues.

322. Build a Private Cloud Storage Service on the Blockchain

323. GitHub Free Security For Repositories Tools Roundup

324. The Blockchain is a Broken Chain After-all

There are several security issues affecting blockchain. To have a wider adoption, the community must address these issues by implementing appropriate controls

325. Physical Cybersecurity: Advanced Methods

Real stories of stolen personal data (such as the Marriott data breach that affected 500 million customers), and cautionary tales in movies and on TV, have helped create the image of the all-powerful hacker who can penetrate the most well-guarded online accounts.

326. Equifax will pay up to $700 million over one of the worst breaches in U.S History!

I still remember that day like yesterday.

327. 20 Data Security Risks Your Company Could Face in 2020

Today, data security is top of mind for companies, consumers, and regulatory bodies. After years of unfettered participation in the data-driven digital age that was defined by an “anything goes” ethos and a “move fast and break things” mentality, this shifting sentiment is both drastic and welcome.

328. The Lowdown on Udacity's Intro to Cybersecurity Nanodegree

This online Nanodegree program with provide you with a strong foundation in cybersecurity skills and workplace-relevant knowledge.

329. How to Secure Your Applications

The CTO of a neo-brokerage FinTech shares tips on how to secure your app -from the front end to the backend. He also recommends tools to use in SDD lifecycle.

330. 6 Keys to Data Center Planning

Data centers require plenty of space, advanced cooling systems and reliable security. Here are six steps designers can take to create successful data centers.

331. Building a Web Vulnerability Scanner

In May this year I was part of a team that launched SecAlerts, a free security product that sends subscribers a customised weekly report of vulnerabilities and security news relevant to their software stack. The service was deliberately made a low-barrier of entry way to keep users informed and, as it nears 1,000 subscribers, the decision to 'keep it simple' appears to have merit.

332. Virtual Private Networks (VPNs): Why You Should be Using Them

There was a time when we never come across the word VPN, but today, it seems like we strongly need it to secure our internet connection.

333. Steganography: How Hackers Hide Malware in Images

Image steganography is a technique that attackers use to hide a secret piece of text, malware, or code inside of an image. This technique is difficult to detect

334. Smart Cities: Cybersecurity in the Era of IoT

A smart city is representative of urbanization in the digital world. The infrastructure of smart cities is built on embedded Internet of Things (IoT) technology. The smart city promises new opportunities and growth in the urban world. These opportunities include better connectivity, productivity, agility, and innovation. However, it is a known fact that with opportunities come challenges.

335. How Fraudsters Carry out Holiday Themed Scams to Steal Your Identity

Online scammers become more active during the holiday season with new and improved techniques to carry out phishing scams. Watch out for a fake personal letter.

336. Secure Coding Practices Every Developer Should Know

This introductory article will help you to understand the best security standards and secure coding practices.

337. The Cybersecurity Writing Contest by Twingate and HackerNoon

Yasssss The Cybersecurity Writing Contest is here! HackerNoon is excited to host the contest in collaboration with Twingate!

338. How You Can Evaluate the Security of Your NPM Package Dependencies

Imagine that you've been working on a node.js project for a few years now. You started or joined it when you were younger. The code works, you can vouch for that it’s good and secure for yourself and your team. But how do you validate all those NPM modules that saved you so much time and effort over the years? It works, nobody has hacked you yet, so why should you bother?

339. Baltic Women In Tech To Watch

I’ve spent 10 years of my life while working as a stylist and fashion editor in the international fashion magazine L'Officiel. I've also just finished a fullstack program, and my friends are confused.

340. How to Implement JSON Web Token (JWT) in Java Spring Boot

JSON Web Token or JWT has been popular as a way to communicate securely between services.

341. Is the Metaverse Ready for Cyberattacks?

The metaverse is the next generation of the Internet. But is the metaverse prepared for cyber attacks? Because it will ultimately face cybersecurity incidents.

342. Are VPNs Really Safe?

Virtual Private Network (VPN) cloaks your online identity, and shielding your data from prying eyes.

343. Sora Enables Shipping While Keeping Your Address Private