Back to feeds

Anonymous

Hey everyone, I'm really stressed out and need your support and answers. I work in the marketing domain. So, in 2023 April, I joined a company and since I didn't like it, I quit it by June thinking I'll get a job easily since I was getting a lot of

See More
Anonymous

Anonymous 1

Stealth • 7m

Since you know basics of CEH and have experience with Kali Linux and Parrot, you might want to explore cybersecurity roles. Many of them focus more on understanding systems and security protocols than pure programming.

0 replies

More like this

Recommendations from Medial

Anonymous
Image Description
Image Description

Hello folks just need some advice i was like same as you like college after job which is non it which is in (MNC) but i have IT skills like MERN STACK, AWS, Linux (Parrot, kali Linux, black hat linux), SQL Except programming i am good at these thin

See More
3 replies7 likes

Vasvi Seth

Stealth • 6m

🚀 Excited to share about Parrot, an open-source Linux distribution that's a go-to for security professionals! 🌐 🔐 Designed for pentesting, forensics, and development, Parrot offers a robust suite of tools for cybersecurity experts. Its lightweigh

See More
0 replies6 likes

Etchno

Stealth • 2m

🚨 Security Alert: The GodLoader malware has exploited vulnerabilities in the Godot Game Engine, compromising over 17,000 systems in just three months. This incident highlights the urgent need for robust cybersecurity measures within the gaming commu

See More
0 replies2 likes

ADI D

Stealth • 2d

Need someone Fir my startup ✅ Expertise in kernel development (Linux, Unix, or custom microkernels) ✅ Advanced knowledge of encryption, access control, and sandboxing ✅ A team of cybersecurity professionals ✅ Compliance with NIST, NSA, and DoD secur

See More
0 replies

Aryan patil

Stealth • 10m

Q-Day, or Y2Q (Years to Quantum), is the date when quantum computers are expected to be able to break public-key cryptography. Cybersecurity and quantum security experts estimate that Q-Day will occur within the next decade. Some say it could happen

See More
0 replies5 likes
Anonymous

👼 20 Coolest Careers in Cybersecurity 👼 Organizations are hiring individuals with a unique set of skills and capabilities, and seek those who have the abilities and knowledge to fulfill many new job roles in the cybersecurity industry. The cooles

See More
0 replies6 likes

Vasvi Seth

Stealth • 5m

🔒 Principle of Least Privilege: Enhancing Security and Efficiency🔒 In cybersecurity, the Principle of Least Privilege (PoLP) is paramount. It means granting users only the minimal access necessary to perform their tasks. By limiting permissions, w

See More
0 replies6 likes

Venkey

Stealth • 5d

🚨 Exciting Opportunity Alert! 🚨 We are seeking a skilled Vulnerability and Penetration Tester for a critical project with the Ministry of Finance. If you're passionate about cybersecurity and ensuring the safety of critical systems, this role is a

See More
0 replies3 likes
Image Description

Payal Manghnani

Stealth • 6m

A big problem occurred when Microsoft's security software stopped working due to a problem with an update from CrowdStrike, a cybersecurity company. This caused a worldwide issue, affecting important things like banks, media organizations, and airl

See More
1 replies5 likes

Sheikh Ayan

Stealth • 3d

Car Hacking Tools: Tools for Automotive Cybersecurity 1. CANtact A USB-to-CAN adapter for analyzing and interacting with a car’s Controller Area Network (CAN) bus. 2. HackRF One A software-defined radio (SDR) that allows researchers to capture a

See More
0 replies

Download the medial app to read full posts, comements and news.