HACKLIDO | Cyber Security
6.97K subscribers
139 photos
15 files
918 links
#1 - Cybersecurity blogging community curating knowledge from wonderful & insightful infosec writers! Join the club right now. 🚀

🧊 https://hacklido.com
Download Telegram
🔰Upcoming Events:
CTF InterIUT 2020 (1176)
Jeopardy
Fri, November 27, 2020 18:00 UTC+00:00
Weight: 0 points
Duration: 2 days


HITCON CTF 2020 (1136)
Jeopardy
Sat, November 28, 2020 02:00 UTC+00:00
Weight: 98 points
Duration: 1 day and 12 hours


SPbCTF's Student CTF 2020 Finals (1189)
Attack-Defense
Sun, November 29, 2020 09:00 UTC+00:00
Weight: 0 points
Duration: 9 hours


Shakti CTF (1141)
Jeopardy
Fri, December 04, 2020 12:30 UTC+00:00
Weight: 0 points
Duration: 1 day


2020 December Metasploit community CTF (1200)
Attack-Defense
Fri, December 04, 2020 15:00 UTC+00:00
Weight: 0 points
Duration: 3 days and 6 hours

Share and support us
@hacklido
Stephane Nappo@hacklido.png
93.1 KB
🔰1920*1080 #cybersecurity #wallpaper !

“If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you.”
― Stephane Nappo

Share and support us ❤️
@hacklido
CTF Open Issue_FINAL @hacklido.pdf
20.6 MB
🔰 #pentestmag open issue #CTF

gathered 5 articles which present case studies from various CTF competitions, a report from Collegiate Penetration Testing Competition (CPTC) written by one of its organizers, an article on the growing meaning of these events in the cybersecurity landscape and how it differs from certification and traditional education learning methods, and last but not least - a piece on the prospect of using CTF concepts as the perfect training for children and teenagers, presented on the case of Bolivia.

Share and support us ❤️
@hacklido
🔰A quick reminder of "Advent of cyber 2" #THM

https://t.me/hacklido/56
Advanced persistent threat @hacklido.pdf
4.2 MB
🔰 #pentestmag open issue #APT

Advanced Persistent Threats. Professor John Walker starts with presenting the interdependence of APTs and Advanced Evasion Techniques (AET). In the article he tries to answer the question why Persistent Threats and Evasions will not see any decline any time soon. Mariana Peycheva, in turn, presents the analysis of Advanced Persistent Threats and its methodology, giving a great overview the topic. As one of our reviewers said: “I wish that most of business leaders and managers would read this”.

Share and support us ❤️
@hacklido
This media is not supported in your browser
VIEW IN TELEGRAM
⚡️The cyber security community to share knowledge, experiences, ideas, guidance and collaborate with other cyber security enthusiasts⚡️


🔰DISCORD
Discord.gg/k8njp9ryE3
🔰TWITTER
Twitter.com/hacklido
🔰INSTAGRAM
Instagram.com/hacklido
🔰TELEGRAM
T.me/hacklido
🔰REDDIT
Reddit.com/u/hacklido
mr.robot everyday @hacklido.png
671.3 KB
🔰1920*1080 #cybersecurity #wallpaper !

Every day, we change the world, but to change the world in a way that means anything, that takes more time than most people have. It never happens all at once. It’s slow. It’s methodical. It’s exhausting.
-Elliot Alderson

Share and support us ❤️
@hacklido
🔰 Automated Security Risk Identification Using AutomationML-based Engineering Data. #blueteam

This prototype identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts. The results of the risk identification process can be used to generate cyber-physical attack graphs, which model multistage cyber attacks that potentially lead to physical damage
.

https://github.com/sbaresearch/amlsec
Bill gates' resume 1974. He was only 18 at this time and his knowledge is quite impressive.