In the ever-evolving world of cybersecurity, the importance of diversity cannot be overstated. It not only brings fresh perspectives and ideas but also reflects the inclusivity that we strive for […]
Blog
Embracing Diversity and Inclusion: A Wonderful Experience at OffensiveCon
In the recently concluded OffensiveCon, SheHacks_KE had the privilege of serving as a diversity partner, a role that brought immense value to our team. But what exactly does it mean […]
Database Replication
Database Replication Set Up MariaDB Master-Slave Replication on Linux[Ubuntu 20.04] In this tutorial, I’ll show you how to set up MariaDB Master-Slave Replication on Linux (Ubuntu 20.04). A sizable community […]
STAYING SAFE ONLINE
STAYING SAFE ONLINE The internet is here to stay so we can as well embrace it and learn how to protect ourselves while surfing through it. In fact, a recent […]
Cyber Threat Intelligence: A Must-Have or Nice-To-Have?
Cyber Threat Intelligence: A Must-Have or Nice-To-Have? What it is Cyber threat intelligence has staked its claim as one of the most prominent proactive cybersecuritymeasures because it helps organizations predict […]
The Power of Support: Building Confidence and Conquering Imposter Syndrome in Cybersecurity
The Power of Support: Building Confidence and Conquering Imposter Syndrome in Cybersecurity You may have experienced Imposter syndrome as a cybersecurity professional at some point in your career. You might […]
Setting up an AWS VPC
Setting up an AWS VPC What is a VPC Amazon Virtual Private Cloud (Amazon VPC) is a service that lets you launch AWS resources in a logically isolated virtual network […]
Digging into the PwnKit vulnerability.
What if I told you, there has been a rather unnoticed vulnerability within most, if not all, Linux operating systems for over 10 years!? Well, this wouldn’t be a record-breaking […]
Data Exfiltration on cloud
Data exfiltration is defined as when an unauthorized person extracts data from the secured systems where it belongs and moves it to insecure or unauthorized systems. Data exfiltration on the […]
Installation of Wazuh agent, sysmon and shipping of logs to the Wazuh Manager on a Windows server (Jira)
What is wazuh agent? The Wazuh agent is multi-platform and runs on the hosts that the user wants to monitor. It communicates with the Wazuh manager, sending data in real […]