New: securityAll contenthive-129948hive-196917krhive-150122zzanhive-180932hive-185836steemhive-183959hive-144064hive-188619hive-166405hive-183397hive-101145photographyuncommonlabhive-145157hive-109690hive-139150hive-103599hive-180301hive-170554hive-139765bitcoincryptidhunterTrendingNewHotLikersweelby (32)in security • 2 days agoAdvanced Security Measures Every Business Should ImplementAn attack surface used to be a pretty well-defined perimeter. Before, a company's digital presence was contained within its own servers, its own network, its own four walls. Today, that perimeter…justyy (83)in blog • 3 days agoA Deeper look into the Trojan/Virus by NordVPN Influencer ScamI was saying that NordVPN says he is not from the Org I then opened the link in the virtual box - ubuntu22. Then I downloaded the "software" that is required to sign the contract. It looks to…justyy (83)in blog • 4 days agoNordVPN says he is not from the OrgA few days ago, I mentioned this Beware of the NordVPN Influencer Scam I've contacted the NordVPN - I got an email from them long time ago for a partnership which seems legit as the email is…blueweave7 (12)in china • 6 days agoChina Cloud Security Market Demand, Trends, Report 2024-2031BlueWeave Consulting, a leading strategic consulting and market research firm, in its recent study, estimated China Cloud Security Market size at USD 2.7 billion in 2024. During the forecast period…skycorridors (71)in router • 8 days agoUPDATE Your Routerjustyy (83)in blog • 9 days agoBeware of the NordVPN Influencer ScamSome one named Salbatore Isom claimed he is from NordVPN: TLDR; when I clicked the "download" it started to download a zip - which I immediately realized it may…opensourceposter (34)in githubsponsors • 14 days agoGitHub Sponsors: Navigating Privacy and SecurityAbstract In this post, we take a deep dive into GitHub Sponsors—a platform that redefines how open-source projects obtain funding while simultaneously tackling essential privacy and security…justyy (83)in blog • 20 days agoNezha Monitor: Quick Access to ServersWith Nezha Monitor Tool, you can SSH to each server, so make sure you harden the configuration - by enabling TLS encryption, and choosing a stronger password (or OAUTH). Other…jakedavis224 (48)in italy • 20 days agoDonald Trump sta temporeggiando sulla sicurezzaDonald Trump sta temporeggiando sulla sicurezza Introduzione Negli ultimi anni, il panorama della sicurezza globale ha subito profondi cambiamenti. Mentre le nazioni affrontano minacce…urussword377 (32)in proxy • 25 days agoIs Your Proxy Secure Enough for Enterprise OperationsA proxy’s job is to hide your real IP, stand between you and the internet, and keep your identity under wraps. However, some proxies are practically handing out your real IP on a silver platter.…opensourceposter (34)in springsecurity • 25 days agoWhat is Spring Security? Open Source Funding, Licensing, and Community Dynamics UncoveredAbstract This post delves into the evolution and inner workings of Spring Security—a Java security framework that has revolutionized enterprise application security through a robust open source…imarcabhay (31)in network • 28 days agosteemCreated with Sketch.Network Security Market Size, Share and Growth Forecast 2025-2033Market Overview: The Network Security Market is experiencing rapid growth, driven by Rise in Cyber Threats and Attacks, Expansion of Remote Work and BYOD Policies and Increase in Cloud-Based…justyy (83)in blog • last monthA False Positive? (litevault.net/cerealguy.png)Didn't know a PNG could be dangerous.. Steem to the Moon🚀! You can rent Steem Power via rentsp ! You can swap the TRON:TRX/USDT/USDD to STEEM via tron2steem ! You…rojsa (72)in camera • last month📹 CC Cameras: Why They’re More Important Than Ever!📹 CC Cameras: Why They’re More Important Than Ever! Hello Steemit family! 👋 Today, I want to share something that’s become a part of our daily lives, often silently watching over us — CC…cryptoposterbot (33)in arbitrum • last monthAssessing the Security of Arbitrum: A Comprehensive Analysis and BeyondAbstract In this post we dive deep into the security of Arbitrum – a Layer 2 scaling solution for Ethereum – and explore its architecture, fraud detection mechanisms, economic incentives, and…r1v3r (25)in hack • last monthFEDs defraud Starbucks. Partakes in Communist Infrastructure.Starbucks communistic compromised security allows US GOV illicit behavior to corrupt data & sedition to conspiracy drfraud, criminal charges. WIFI MAC:16:FE:CF:10:B8:... Wi-Fi networks and…justyy (83)in steem • last monthSteem Load Balancer Got Malformed JSON payload (scan or attack?)The got a SIGTERM and I checked the logs and see quite a few requests with Malformed JSON payload. I can see: php echo ...r1v3r (25)in parents • 2 months agoDangerous conditions are explained, US gov poor ability determining legal rights.5:48PM Chicago Time MAY27 2025 US gov persons threatening lives of innocent children, as persons explain their absolute poor judgment that results within illegal custody, I am told Megan Sharon Gray…justyy (83)in blog • 2 months agoA Peek on the Leaked Database (Colocrossing)The leaked database (virtualizor.sql) has been provided by hacker: the passwords are hash-ed, hopefully with the "seed" So, please do change the passwords! VPS Table mysql>…