To Be Updated… Kindly check back on Thursday 16th November
Blog
Embracing Diversity in Cybersecurity: Insights from Yarden Shafir
In the ever-evolving world of cybersecurity, the importance of diversity cannot be overstated. It not only brings fresh perspectives and ideas but also reflects the inclusivity that we strive for […]
Embracing Diversity and Inclusion: A Wonderful Experience at OffensiveCon
In the recently concluded OffensiveCon, SheHacks_KE had the privilege of serving as a diversity partner, a role that brought immense value to our team. But what exactly does it mean […]
Database Replication
Database Replication Set Up MariaDB Master-Slave Replication on Linux[Ubuntu 20.04] In this tutorial, I’ll show you how to set up MariaDB Master-Slave Replication on Linux (Ubuntu 20.04). A sizable community […]
STAYING SAFE ONLINE
STAYING SAFE ONLINE The internet is here to stay so we can as well embrace it and learn how to protect ourselves while surfing through it. In fact, a recent […]
Cyber Threat Intelligence: A Must-Have or Nice-To-Have?
Cyber Threat Intelligence: A Must-Have or Nice-To-Have? What it is Cyber threat intelligence has staked its claim as one of the most prominent proactive cybersecuritymeasures because it helps organizations predict […]
The Power of Support: Building Confidence and Conquering Imposter Syndrome in Cybersecurity
The Power of Support: Building Confidence and Conquering Imposter Syndrome in Cybersecurity You may have experienced Imposter syndrome as a cybersecurity professional at some point in your career. You might […]
Setting up an AWS VPC
Setting up an AWS VPC What is a VPC Amazon Virtual Private Cloud (Amazon VPC) is a service that lets you launch AWS resources in a logically isolated virtual network […]
Digging into the PwnKit vulnerability.
What if I told you, there has been a rather unnoticed vulnerability within most, if not all, Linux operating systems for over 10 years!? Well, this wouldn’t be a record-breaking […]
Data Exfiltration on cloud
Data exfiltration is defined as when an unauthorized person extracts data from the secured systems where it belongs and moves it to insecure or unauthorized systems. Data exfiltration on the […]