white2hack 📚
12.5K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://t.iss.one/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
First things first: Threat Modelling using Free and Open Source Tools by Roger Carhuatocto

On 2014 RSA Conference (archive not available), Eric Olson of Cyveillance said a good and real simil about Threat Modelling: “It is a lot like teenage sex: Everyone is talking about it, everyone thinks everyone else is doing it, and most of the few people who are actually doing it aren’t doing it all that well”.

Source

#useful #DevSecOps
👍4
Docker на практике, Иан Милл, Эйдан Хобсон Сейерс, 2020

Данная книга научит вас надежным, проверенным методам, используемым Docker, таким как замена виртуальных машин, использование архитектуры микросервисов, эффективное моделирование сети, производительность в автономном режиме и создание процесса непрерывной доставки на базе контейнеров. Следуя формату «проблема/решение» в стиле поваренной книги, вы изучите реальные варианты использования Docker и узнаете, как применить их к собственным проектам.

#book #DevSecOps
👍3
CLOUD SECURITY HANDBOOK FOR ARCHITECTS, Ashish Mishra, 2023

Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps

#book #DevSecOps
👍4
Cloud Attack Vectors. Building Effective Cyber-Defense Strategies to Protect Cloud Resources by Morey J. Haber, Brian Chappell and Christopher Hills, 2022

Cloud Attack Vectors details the risks associated with cloud deployments, the techniques threat actors leverage, the empirically-tested defensive measures organizations should adopt, and shows how to improve detection of malicious activity.

What You’ll Learn

(+) Know the key definitions pertaining to cloud technologies, threats, and cybersecurity solutions
(+) Understand how entitlements, permissions, rights, identities, accounts, credentials, and exploits can be leveraged to breach a cloud environment
(+) Implement defensive and monitoring strategies to mitigate cloud threats, including those unique to cloud and hybrid cloud environments
(+) Develop a comprehensive model for documenting risk, compliance, and reporting based on your cloud implementation

#book #DevSecOps
👍3
Becoming a DevOps Engineer RoadMap

This comprehensive roadmap covers most of the essential skills, tools, and concepts you'll need to become a professional DevOps Engineer.

Remember, DevOps is an evolving field, so continuous learning and hands-on experience with real-world projects will be invaluable

#DevSecOps
🔥3
Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments by David Okeyode, Karl Fosaaen, Charles Horton, 2023

This book offers a no-faff, hands-on approach to exploring Azure penetration testing methodologies, which will get up and running in no time with the help of real-world examples, scripts, and ready-to-use source code.

What you will learn
(+) Identify how administrators misconfigure Azure services
(+) Understand how to detect cloud infrastructure
(+) Explore processes and techniques for exploiting common Azure security issues
(+) Use on-premises networks to pivot and escalate access within Azure
(+) Diagnose gaps and weaknesses in Azure security

#book #windows #DevSecOps
👏5
⭐️ Awesome Secure Coding Labs ⭐️

Develop secure applications with hands-on labs in popular programming languages like Python, Java, C++, and JavaScript, all designed to teach security best practices. Whether you're writing code in PHP, Ruby, or even Go, we’ve got you covered!

These labs help you identify vulnerabilities, fix them, and enhance the resilience of your applications—perfect for developers and security enthusiasts worldwide

C#: https://lnkd.in/dmJ6iDHw
Swift: https://lnkd.in/d6pvDXtM
Java: https://lnkd.in/dteuFXw6
Ruby: https://lnkd.in/drF-izHf
C++: https://lnkd.in/d5dawHAZ
Go: https://lnkd.in/dQNwdHyd
JS: https://lnkd.in/d3542Zsu
PHP: https://lnkd.in/dY6VsUgh
Python: https://lnkd.in/dcpPJeJr

#DevSecOps #AppSec
🔥4👍1
API Best Practice with OpenAPI Specification

One of the most popular formats available to represent RESTful APIs is OpenAPI v3.0. Due to its high adoption rate, we notice great tooling support for this format where you can get varied services for your API.

❗️Source

#AppSec #DevSecOps
Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware, Cassie Crossley, 2024

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process. This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain.

Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware. With this book, you'll learn how to: Pinpoint the cybersecurity risks in each part of your organization's software supply chain. Find the cybersecurity frameworks and resources that can improve security Identify the roles that participate in the supply chain--including IT, development, operations, manufacturing, and procurement Design initiatives and controls for each part of the supply chain using existing frameworks and references Evaluate third-party risk in your supply chain

#book #DevSecOps