
networking
From Packet Capture to Threat Hunting with Wireshark
Learn how to leverage Wireshark’s powerful features for effective network analysis and security monitoring
networking
Learn how to leverage Wireshark’s powerful features for effective network analysis and security monitoring
security
Linux powers an estimated 90% of the cloud workload worldwide. Linux-based servers are an engineer's favorite when it comes to developing world-class products. But the idea that Linux is inherently secure is a common misconception. In 2022 alone there were around 1.7 million new Linux malware samples.
security
Dive into one of the most complex malware ever written, which affected more than 10 countries and even nuclear power plants. This industrial-grade attack was one of the first of its kind. Here is a small exploration of how it works and the history behind it.
ctfs
In this article, we explore how top cybersecurity hackers acquire their skills. You will also learn how you can develop these abilities and reach their level.
ai
Insecure Output Handling on LLMs deals with injecting poisonous data during the training phase. In this article, we will be focusing on real-world scenarios, practical demos, and prevention mechanisms along with examples.
ai
Training data poisoning on LLMs deals with injecting poisonous data during the training phase. In this article, we will be focusing on attack scenarios, previous successful attacks, and prevention mechanisms along with good examples.