Category: Cybersecurity
Jenkins Parallel Stages with Declarative Pipeline running AI SAST and SCA Scans
If you are reading this article with the word “Parallel Stages” in the title, I believe you already know what Jenkins is and what it does do. Still, if you want a quick refresher, you can have a look at...
How to set up an open-source Threat Intelligence Platform using Docker
Threat, vulnerabilities, risks, incidents are very common words in the cyber world. Vulnerabilities bring threats and risks, apparently leading to security incidents. In this article, we will be focusing on Threat Intelligent. Here, we will install our own Threat Intelligence...
Automatically clear all site data from Chrome
Many of us know that the popular YouTube channel Linus Tech Tips got hacked a few days ago. Of course, none of us want to be in the same situation and get our session tokens stolen so the attacker (usually...
Hashcat Apple M1 Pro Benchmark
What is Hashcat? Hashcat is a fascinating and powerful password recovery tool used by both professionals and amateurs. hashcat is the world’s fastest and most advanced password recovery tool. Source: Hashcat Official Website. If explained in layman’s terms, hashcat guesses...