cybersecurity
1012 Threads
How to Become an Ethical Hacker in 6 Months #CyberAttack #cybersecurity #security #attack #hacked #Hacking #community https://t.co/PJllCD53Iv
Cybersecurity has a wide range of areas and much depth, this thread will help provide you with some guidance that may help you. #RT #cybersecurity #security #job #opportunity #ca...
๐ช Code Literacy is a Super Power for Hackers ๐ช (and Security Literacy is a super power for devs) Knowing how vulnerabilities are mitigated makes you a 10x engineer (sec or dev)...
Ransomware is without a doubt the closest analogue to historical piracy in the world today. It has moved billions of dollars of wealth from the Anglo economic sphere of influence,...
What is the #Wormhole bridge? How did Jump recover $200M from the hacker? All answered below ๐ https://t.co/n6d8Jg3XkK
๐ ffuf is a powerful tool for fuzzing different parts of an HTTP request. Here's a basic guide that should get you started. ๐ 1๏ธโฃ Basic Use the FUZZ placeholder to define the loc...
Vuln: 403 & 401 Bypasses Severity: High HTTP 401 and 403 are both status codes that indicate that a client's request to a server was not successful. 401 -- client provides no cr...
Difference between API Authentication and API Authorization. Thread ๐งต๐
Myth: You need a Degree / Certification in Tech to get started in Cybersecurity Reality: You need YouTube Get started with this 12 YouTube pages
16 Search Engines for Cybersecurity Professionals/Researchers:
The Ethereum ecosystem is hindered by disparate entities with their own networks of trust. Can @Eigenlayer be the solution for increased security and additional revenue streams?...
20 Cybersecurity Certifications to Add to Your Resume/CV (All FREE)
7 Steps to Take When Pivoting into the Cybersecurity Industry
Tools for video๐ฝ๏ธ analysis Basic online tools to help you use information from videos more effectively in your #osint investigations: - text extraction - deepfake detection - in...
1/ EigenLayer will democratize ETHโs security for all onchain applications. Oracle & bridge exploits will become a thing of the past. With @eigenlayer, $ETH will secure their oper...
Top 18 Cybersecurity Tips 1 Use Anti Virus and Anti Malware 2 Keep Software Up-to-Date 3 Keep Hardware Up-to-Date 4 Donโt be Lazy with Passwords 5 Always Scan External Storage...
Top 35 Cybersecurity Tools 1.Nmap 2.Metaspoilt 3.Cain and Abel 4.Wireshark 5.Kali Linux 6.John the Ripper 7.Nikto 8.Forcepoint 9.Burp Suite 10. Tor 11.Tcpdump 12. Aircrack-ng 13....
How to Become an Ethical Hacker in 6 Months #cybersecurity #Hacking #Hacked #Pentesting #Security #community https://t.co/56POZaH0Ko
Top 9 Hacker Gadgets 1. Raspberry Pi: This is a low cost credit card sized desktop computer that runs Linux and it also provides a set of GPIO (general purpose input/output) p...
How to secure a Kubernetes Pod ? A Short Thread ๐ https://t.co/0BBoIn3yYz
Here are 12 Important Source of Cybersecurity Training Resources Blogs, Courses , Webinars, Videos, Books A Thread ๐งต
I've seen some people complaining about Twitter putting text-based 2FA behind the paywall. There is gladly a far better way that still works for everyone (and to be honest, text-b...
Learn Cybersecurity for FREE on YouTube. Here are 12 pages to check out
Now that app-based authentication is far more common, let's talk about a major sin Google is doing: They ONLY recommend using Google authenticator. Google authenticator is one of...