CybergirlmeetupWhat’s your story on CyberbullyingThe concept of cyberbullying has gained prominence alongside the advancement of technology and individuals’ increasing reliance on social…Apr 13Apr 13
CybergirlmeetupBe More Like Your Adversaries: A Call for Deeper ContemplationIn today’s rapidly evolving landscape and technological advancement, a recurring theme demands our meticulous consideration — the…Aug 13, 2023Aug 13, 2023
CybergirlmeetupHow inclusive is your cybersecurity training?Walking past a very prestigious hotel, I admired the aesthetics, design, and general outlook of the building. It was so obvious that I was…May 11, 2023May 11, 2023
CybergirlmeetupHow effective is your organization's physical security?As cybersecurity professionals, we’ve become the preachers of our time. We emphasize the use of strong passwords, not using your work…Apr 25, 2023Apr 25, 2023
CybergirlmeetupHow secure is your Active Directory?In the digital age, security is of paramount importance. Organizations use Active Directory, along with other systems and tools, to secure…Apr 8, 2023Apr 8, 2023
CybergirlmeetupNMAP: The Network MapperHave you ever wondered what devices are connected to your network or which ports are open on your system? If you have, then you need Nmap —…Mar 28, 2023Mar 28, 2023
CybergirlmeetupUsing Social Engineering Toolkit to clone a Facebook pageWhat came to your mind the first time you heard the word “social engineering"?Mar 21, 2023Mar 21, 2023
CybergirlmeetupQUESTIONS TO ANSWER BEFORE STARTING UP IN CYBERSECURITYRecently, I’ve been privileged to talk to people hoping to start a career in cybersecurity. Truly, it’s always amazing when I get to talk…Mar 3, 2023Mar 3, 2023
CybergirlmeetupIF YOU ARE JUST STARTING OUT IN LINUX, THIS MIGHT HELPLinux is open-source software, which makes improvement easier, faster, and very innovative. Open-sourced simply means the source code is…Feb 27, 2023Feb 27, 2023
CybergirlmeetupPractical Penetration Methodology1. Discovering of Host: This is very important in penetration engagement. This host could be discovered through the internal network or…Oct 25, 2022Oct 25, 2022