Homepage
Open in app
Sign in
Get started
Contribute
Tech
Programming
Data Science
Software Development
Cybersecurity
Newsletter
Cybersecurity
Latest
How to Restrict Insider Access by Using Application-Layer Encryption
How to Restrict Insider Access by Using Application-Layer Encryption
In this article, we’ll explore how application-layer encryption works and how it restricts insider threats.
Rehmanabdul
Sep 23
10 Tips for Detecting and Responding to Security Breaches on Linux
10 Tips for Detecting and Responding to Security Breaches on Linux
Get 10 actionable tips that will help you to secure your Linux environment and respond effectively to potential security incidents.
Rehmanabdul
Jul 14
Strengthening Software Development Security: Critical Takeaways from the CrowdStrike Incident
Strengthening Software Development Security: Critical Takeaways from the CrowdStrike Incident
I am writing this post in a week when we saw the most significant IT outage ever. A content update in the CrowdStrike sensor caused a blue…
Gurvinder Pal Singh, The CyberChef
Jul 22
Building and Deploying a USB-Activated Keylogger: A Technical and Ethical Exploration
Understanding the Mechanics and Implications of USB-Activated Keyloggers
Meher Khurana
Jul 16
Tuesday Morning Threat Report: Jul 9, 2024
Tuesday Morning Threat Report: Jul 9, 2024
Hackers threaten to leak Taylor Swift tickets, Europol complains about privacy technology, and Brazil orders Meta to pause their AI…
Mark Maguire
Jul 8
Open-Source Intelligence (OSINT): A Complete Guide for Beginners
Open-Source Intelligence (OSINT): A Complete Guide for Beginners
Web intelligence, also known as open-source intelligence (OSINT), is the process of collecting, analyzing, and disseminating information…
Cyber Hub Intelligence
Nov 20, 2023
Introducing Amazing Python Packages (2) — PassLib
Introducing Amazing Python Packages (2) — PassLib
In this second article of the “Introducing Amazing Python Packages” series, we delve into PassLib, a comprehensive password hashing…
Yufeng Chen
Jul 3
Automating user and group creation using bash script
Imagine you are SysOps engineer at a tech company and you are always creating user accounts, setting up home directories ,assigning groups…
Bridget
Jul 1
7 Best Python Libraries for Cybersecurity in 2024
7 Best Python Libraries for Cybersecurity in 2024
This article will highlight the 7 best Python libraries for cybersecurity in 2024, providing insights into their practical applications.
Rehmanabdul
Jun 26
Privacy
Understanding Grabify: IP Loggers and Ethics
Understanding Grabify: IP Loggers and Ethics
In today’s digital landscape, safeguarding online privacy has become more important than ever. With the proliferation of tracking tools…
Rohit Saini
Sep 13
Enabling Next-Gen LLM Applications via Multi-Agent Conversation: A Comprehensive Framework
Enabling Next-Gen LLM Applications via Multi-Agent Conversation: A ...
AutoGen is a novel open-source framework designed to facilitate the development of next-generation applications utilizing Large Language…
Patel
Aug 31
Are we stepping into the era of trapped consent?
Are we stepping into the era of trapped consent?
If we are already struggling to keep up with basic, physical consent, how are we to take on digital consent without doubling down on…
Geraldine Lee
May 14
Avoid Monetizing Your Sensitive DNS Data by Using DNSCrypt-proxy
Avoid Monetizing Your Sensitive DNS Data by Using DNSCrypt-proxy
Using a sole encrypted DNS resolver protects against eavesdroppers, but exposes data vulnerability to that only public resolver…
Levente Csikor
Sep 16, 2023
About CodeX
Latest Stories
Archive
About Medium
Terms
Privacy
Teams