-
Grab a nice fresh pot of tea and enjoy reading this list of data breaches: https://github.com/vz-risk
_specifically_: https://github.com/vz-risk/VCDB
![image](https://user-images.githubusercontent.c…
-
## Background
In JAC digital, it is essential to ensure the security of our digital infrastructure is up to date. Our previous Penetration Test was conducted in 2021, hence a new test is due to take …
-
Network access control is in the resposibility of the hospital. The only way we have to mitigate cyber security risks relating to access control, is to specify requirements for setup and maintenance o…
-
# Java反序列化
Java反序列化 什么是序列化和反序列化 如果我们需要持久化 Java 对象比如将 Java 对象保存在文件中,或者在网络传输 Java 对象,这些场景都需要用到序列化。\n序列化:将数据结构或对象转换成二进制字节流的过程 反序列化:将在序列化过程中所生成的
[https://lantern-lab.github.io/post/java-derivativeizatio…
-
### What Roadmap is this project for?
Cyber Security
### Project Difficulty
Intermediate
### Add Project Details
required Language: Python
required Libraries: smtplib for sending email…
-
this is really insecure, why would you store the passwords in plain text in a mongo db? it is currently not really usable as a real password manager.
I suggest at least encrypting the passwords wit…
-
https://www.databreaches.net/uk-colchester-institute-suffers-cyber-security-attack/
-
### What Roadmap is this project for?
Cyber Security Expert
### Project Difficulty
Intermediate
### Add Project Details
## What is this project about?
In this project, you will set up a SIEM n…
-
Sba7o
-
Basically researching now, looking for additional inspiration!