Homepage
Open in app
Sign in
Get started
Contribute
Tech
Programming
Data Science
Software Development
Cybersecurity
Newsletter
Cybersecurity
Latest
Building and Deploying a USB-Activated Keylogger: A Technical and Ethical Exploration
Understanding the Mechanics and Implications of USB-Activated Keyloggers
Meher Khurana
Jul 16
Tuesday Morning Threat Report: Jul 9, 2024
Tuesday Morning Threat Report: Jul 9, 2024
Hackers threaten to leak Taylor Swift tickets, Europol complains about privacy technology, and Brazil orders Meta to pause their AI…
Mark Maguire
Jul 8
Open-Source Intelligence (OSINT): A Complete Guide for Beginners
Open-Source Intelligence (OSINT): A Complete Guide for Beginners
Web intelligence, also known as open-source intelligence (OSINT), is the process of collecting, analyzing, and disseminating information…
Cyber Hub Intelligence
Nov 20, 2023
Introducing Amazing Python Packages (2) — PassLib
Introducing Amazing Python Packages (2) — PassLib
In this second article of the “Introducing Amazing Python Packages” series, we delve into PassLib, a comprehensive password hashing…
Yufeng Chen
Jul 3
Automating user and group creation using bash script
Imagine you are SysOps engineer at a tech company and you are always creating user accounts, setting up home directories ,assigning groups…
Bridget
Jul 1
7 Best Python Libraries for Cybersecurity in 2024
7 Best Python Libraries for Cybersecurity in 2024
This article will highlight the 7 best Python libraries for cybersecurity in 2024, providing insights into their practical applications.
Rehmanabdul
Jun 26
Dispelling Cybersecurity Doubt by Embracing the Future with Confidence and Confronting the Risks of…
Dispelling Cybersecurity Doubt by Embracing the Future with Confidence and Confronting the Risks of…
In a rapidly evolving digital landscape fraught with cyber threats, the risks of maintaining the status quo are dire. Legacy cybersecurity…
Cyber Strategy Institute
May 30
Web API Security Champion Part III: Broken Object Property Level Authorization (OWASP TOP 10)
Web API Security Champion Part III: Broken Object Property Level Authorization (OWASP TOP 10)
Explaining one of the most common web API vulnerability classes — Broken Object Property Level Authorization in a practical manner…
Krzysztof Pranczk
Jun 3
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration
In the ever-evolving landscape of software development and cybersecurity, staying updated with the latest standards and protocols is…
Igor Venturelli
May 24
Privacy
Are we stepping into the era of trapped consent?
Are we stepping into the era of trapped consent?
If we are already struggling to keep up with basic, physical consent, how are we to take on digital consent without doubling down on…
Geraldine Lee
May 14
Avoid Monetizing Your Sensitive DNS Data by Using DNSCrypt-proxy
Avoid Monetizing Your Sensitive DNS Data by Using DNSCrypt-proxy
Using a sole encrypted DNS resolver protects against eavesdroppers, but exposes data vulnerability to that only public resolver…
Levente Csikor
Sep 16, 2023
Revolutionizing Communication with Unparalleled Decentralized SIP VoIP — Marina.Rodeo.
Revolutionizing Communication with Unparalleled Decentralized SIP V...
This innovative solution is set to redefine the way we connect, communicate, and collaborate, providing a new horizon for the world of…
Dmitry Sorokin
Aug 11, 2023
How To Self Host Your Own YouTube Instance.
How To Self Host Your Own YouTube Instance.
Unlock control over your content with a self-hosted YouTube instance. Own your data, and TIME !!
Prinux
Aug 12, 2023
About CodeX
Latest Stories
Archive
About Medium
Terms
Privacy
Teams