Sept. 21, 2022, 11:21 a.m. | Scott Eggimann

Hacker Noon - cybersecurity hackernoon.com

This behind-the-scenes walkthrough serves as a great example showing how Linux servers are exploited if you don’t keep them patched and up-to-date. We’ll learn how threat actors use Reconnaissance, Scan, Obtain Access, Exfiltrate data, Maintain Persistance and Pivot while compromising a Linux system. Each open port is vulnerable to a potential attack.

Read All

cybersecurity data-extraction exploit hacker linux metasploit nmap pentesting proftpd server

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Consultant

@ Auckland Council | Central Auckland, NZ, 1010

Security Engineer, Threat Detection

@ Stripe | Remote, US

DevSecOps Engineer (Remote in Europe)

@ CloudTalk | Prague, Prague, Czechia - Remote

Security Architect

@ Valeo Foods | Dublin, Ireland

Security Specialist - IoT & OT

@ Wallbox | Barcelona, Catalonia, Spain