@anasnasim12 shared a post, 3 weeks, 3 days ago
Student

Machine Learning for Cybersecurity

Everything about Machine Learning for Cybersecurity and in-between.

ML for CS
@bridgecrewio shared a post, 5 months ago , in BridgeCrew

Vulnerabilities vs. Security Misconfigurations: An Essential Primer

When you hear the term “security breach,” chances are that risks like malware or ransomware attacks come to mind. These exploits tend to feature in headlines about major cybersecurity attacks.

Screen Shot 2022-01-27 at 1.26.23 PM.png
@adetomiwaj shared a post, 5 months ago

Methodology for Malware Static analysis: Portable Executable (PE) files

Malware analysis determines if a program/file is malicious. There are two phases in malware analysis.

1_NX4Ji7IweLK4Oth9kJGscA.png
@cyberpotato shared a post, 5 months, 2 weeks ago

Four Questions Your Information Security Team Should be Asking

The key to succeeding in information security and cyber threat intelligence is recognizing what you’re dealing with, and adapting accordingly.

1_ww3Fn4Y9jar-G1now-2reg.jpeg
@kyle_hemsley shared a post, 6 months, 2 weeks ago

Securing Microsoft Azure AD with FIDO2 Keys — Passwordless Authentication

Azure AD is a powerful cloud-based IdP from Microsoft that many organizations have “free” access to through their M365 subscriptions for Office 365 / Exchange Online.

0_5PbNRd5eaElf5giZ.jpeg
@thecybermutt shared a post, 6 months, 3 weeks ago

Deciphering A Caesar Cipher with Python

Caesar ciphers map out characters to other characters based on a number key chosen by the designer of the Caesar cipher.

@blackcoffeeid shared a post, 7 months, 1 week ago

Cyber Security Awareness Anatomy

Anatomy (anatomē) is branch of Biology that has concern about the organism’s structure. The word of Anatomy comes from Greek words “ana” means up and “tome” means cutting. Key practice of medicine and other areas of health are to understand the Anatomy.

1_sApi-_yekucokqwRxAJbKA.png