Introducing a comprehensive SOC Incident Response Playbook a fully structured, 100+ page collection of real world runbooks built for modern security operations teams.
🚨 OSCP GIVEAWAY ALERT🚨
We’re giving away 3 OSCP vouchers to supercharge your pentesting journey – proudly sponsored by @offsectraining ! 💥🙌
To enter:
1.✅ Follow Us
2.🔁 Retweet this post
3.❤️ Like this post
4.💬 Reply with your funniest cybersecurity meme
🎯 We’ll pick 3 random winners – don’t miss your chance to win the gold standard in offensive security!
🗓️ Deadline= 20 June
Let the hacking+meme battle begin! 🧠💻
#OSCP#OffSec#Giveaway#BSidesAhmedabad#Infosec#Cybersecurity
⚠️ Giveaway time! ⚠️ 👇
📢 Our new course "Attacking AI" will be Feb 27-28!
This two-day course equips security professionals with the tools and methodologies to identify vulnerabilities in AI systems. It's gonna be a BANGER.
Syllabus: payhip.com/b/2qPZ1
We are giving away two seats this week!
⁉️How to enter the giveaway:
♻️ Repost this post = 2 Entries
🗣️ Reply = 1 Entry
❤️ Like = 1 Entry
Security training is often considered a waste of time.
10 essential techniques from Google Cloud CISO @philvenables on what leading organizations are doing.
🗒 The Techniques
1. Computer Based Training (if you have to do it then do it better)
2. Ambient Controls (Solutions Not Just Policies)
3. Explain the Purpose of Controls
4. Risk Culture / Escalation
5. Gamification, Labs and Ranges
6. ...
Check out the post:
philvenables.com/post/security-…
After months of work, I have finally updated my Bug Bounty course with a massive focus on hands-on labs through @hackinghub_io!
More info here 👉🏼 bugbounty.nahamsec.training
Use code UPDATE50OFF to get 50% off!
I also have some free codes! RT/Reply for a chance to win!
Roadmap for Learning Cyber Security
By Henry Jiang. Redrawn by ByteByteGo.
Cybersecurity is crucial for protecting information and systems from theft, damage, and unauthorized access. Whether you're a beginner or looking to advance your technical skills, there are numerous resources and paths you can take to learn more about cybersecurity. Here are some structured suggestions to help you get started or deepen your knowledge:
🔹 Security Architecture
🔹 Frameworks & Standards
🔹 Application Security
🔹 Risk Assessment
🔹 Enterprise Risk Management
🔹 Threat Intelligence
🔹 Security Operation
–
Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): bit.ly/3KCnWXq
You're using Burp Collaborator wrong.
Don't use Burp's default collaborator instance when testing for out of band vulnerabilities.
Many companies use egress filtering & block outbound traffic to the default collaborator domain oastify.com
It's worth setting up a private instance: github.com/putsi/privatec…#typefully day 11
The next cohort of "The Bug Hunter's Methodology Live" will be:
US: March 2nd-3rd
EU: March 9th-10th
tbhmlive.com
Repost, like, and reply for a chance at a free seat!
New in v2.5 - More Burp, more JS analysis, more IDOR/MFLAC!