1,123 Results for:HTTPS

  • Sort by: 

Sslstrip tutorial for penetration testers

By Karthik Poojary 16 Dec 2011

Sslstrip is a powerful tool to extract sensitive credentials using HTTPS stripping. This sslstrip tutorial explains the working of sslstrip in-depth. Read More

Attack on Beanstalk Farms results in $182M loss

By Arielle Waldman 18 Apr 2022

High payouts and security weaknesses make cryptocurrency a growing target, which was highlighted even further in the latest attack involving virtual currency and a DeFi platform. Read More

How to restore a Kubernetes cluster from an etcd snapshot

By Brien Posey 16 Dec 2021

In case of an event that leads to the loss of a Kubernetes cluster, it's important to be restore-ready. Here's how to restore a cluster from an etcd snapshot with commands. Read More

How to implement principle of least privilege in Azure AD

By Kyle Johnson, Packt Publishing 05 May 2023

Restricting users' permissions in Microsoft Azure AD to only what they need to complete their job helps secure and reduce the cloud attack surface. Read More

GraphQL API Security: 5-things developers should know

By Adrian Bridgwater 24 Jan 2023

This is a guest post for the Computer Weekly Developer Network written in full by Sandeep Devarkonda in his role as VP of customer success at Hasura.  Hasura is known for its technology designed to ... Read More

Managing open source components in the software supply chain

By Nihad Hassan 25 Aug 2023

Software supply chain attacks are becoming increasingly common. There is no single measure that can stop attacks, but implementing security precautions can reduce risk. Read More

How Data Mining Can Optimise Mining Mining...

By Steve Broadhead 01 Nov 2022

It’s all too easy to get so engrained in the world of IT that sometimes you need a reminder that the globe is a large and diverse place; one that isn’t purely digital. Such a reminder came most ... Read More

Warning over ransomware attacks spreading via Fortinet kit

By Alex Scroxton 05 Jan 2023

Following the disclosure of a critical vulnerability in October 2022, Fortinet VPN devices were exploited in two known ransomware attacks, with access likely sold on the dark web Read More

Equipment to include in a computer forensic toolkit

By Kyle Johnson, Packt Publishing 28 Oct 2022

Computer forensic investigators require more than software to do their job. Learn what equipment constitutes a complete computer forensic toolkit. Read More

Hackers upping SSL usage for encrypted attacks, communications

By Shaun Nichols 28 Oct 2021

A report from cloud security vendor Zscaler found that cybercriminals are using secure connections to evade detection while carrying out network attacks. Read More