BugBase
@BugBase
Followers
2K
Following
647
Media
456
Statuses
751
Join us for Live hacking event with @_groww Whatโs in it for you? - Bounty rewards up to $7,500 per eligible bug (severityโbased) - Special prizes for the Most Valuable Hacker & the Top 3 performers - When: April 25/26, 2025 - Where: Bangalore - RSVP: https://t.co/WKnWrkkvrO
1
2
11
Pentest Copilot by @BugBase demonstrates lateral movement in network using an SSH key found on a compromised host. The video shows the complete attack flow from the compromised host to running the agent(RAT) on the remote host with a clear, step-by-step exploit graph.
0
4
9
Special campaign alert: Growwโs Bug Bounty now offers 1.5x rewards for vulnerabilities risking PII exposure & security control bypass. Join here: https://t.co/EUq96118Cx
#Groww #BugBounty #CyberSecurity #Infosec
@_groww
1
5
11
Wishing everyone a very Happy New Year 2025! ๐ We ended 2024 with our first live hacking event in collaboration with @ClearfromCT and @Nullblr. In 2025, weโre aiming even higher with larger events, bigger collaborations, and more opportunities for researchers.
0
1
10
๐ฅ Groww just launched a Bug Bounty program on BugBase with rewards of up to $3,000! ๐ Are you ready to hunt vulnerabilities & secure the future of finance? ๐ฐ๐ ๐ Start now: https://t.co/EUq96118Cx
#BugBounty #CyberSecurity #Groww #BugBase #EarnRewards
0
5
32
Missed the Webinar on "Comprehensive Analysis of JWT Vulnerabilities" by Pragya Gupta, Security Engineer at PhonePe? Watch the Full Recording Now: https://t.co/mmW3jhYxJG
#BugBase #Webinar #BugGyaan #JWTs #Cybersecurity
0
2
1
Deep Learning Specialization by Andrew Ng: https://t.co/4vDz6ya0Fm Neural Networks by 3Blue1Brown: https://t.co/XO7CxKyedD A gentle introduction to Machine Learning by StatQuest with Josh Starmer: https://t.co/WXjNia9La0
#Cybersecurity #AI #MachineLearning #LearningResources
0
0
1
These topics act as a good starting point for anyone willing to get a basic intuitive understanding of AI. For further learning, check out these resources:
1
0
1
๐ง Deep Learning Basics: - Neural Networks: Explore the basics of neural networks, the building blocks of deep learning. - Convolutional Neural Networks (CNNs): Discover how CNNs are used for image recognition and general classification.
1
0
0
๐ธ๏ธ Advanced Machine Learning Techniques: - Decision Trees: Understand how decision trees can be used for classification and regression tasks. - Graphs: Explore the use of graph-based models in machine learning.
1
0
0
๐ Fundamentals of Machine Learning: - Linear Regression: Understand the fundamentals of predicting outcomes using linear relationships. - Logistic Regression: Learn how to predict categorical outcomes, crucial for binary classifications. - Support Vector Machines (SVM)
1
0
0
๐ค Have you ever felt lost with all the jargon and words being thrown around about AI? As cybersecurity enthusiasts, many of you might have felt some FOMO or fear about this. So, here's your guide to developing a basic understanding of AI:
1
0
2
E) Monitor and Analyze: Continuously monitor user activity and network traffic for suspicious behavior. Here are some good places to start: 1. ๐ https://t.co/TqDTBCWI0C 2. ๐ https://t.co/YJoAAu8d5Q
#ZeroTrust #CyberSecurity #CloudSecurity #NetworkSecurity #DataProtection
0
0
0
C) Enforce Least Privilege Access: Limit user access to only what is necessary for their role and function. D) Micro-Segment Your Network: Divide your network into smaller segments to contain potential breaches.
1
0
0
๐ ๏ธ Steps to Implement Zero Trust Security in Your Company: A) Identify Your Critical Assets: Determine which data, applications, and services are most critical to protect. B) Verify User Identity: Implement multi-factor authentication to ensure users are who they claim to be
1
0
0
Why use the Zero Trust Model? 45% of breaches involved cloud-based services, hence the need for robust security in distributed environments.
1
0
0
๐ A report by Cisco, based on a survey of 4,700 global information security professionals, found that 86.5% have started implementing some aspect of the zero-trust security model, but only 2% have mature deployments in place.
1
0
0