We believe in experiences of every kind, for everyone - small or tall! Colleagues at our Center of Excellence in Bucharest, Romania recently hosted Children’s Day at the office, a day packed with engaging workshops and exciting activities for our young travelers. Naturally, as the world’s leading provider of online travel, the event wouldn’t be complete without some technology lessons on the basic concepts of programming, simple algorithms and cybersecurity presented by our awesome team members.
Booking Holdings (NASDAQ: BKNG)’s Post
More Relevant Posts
-
Cybercrime analyst👮♂️ | BSc. Computer Science (Pending)👨💻| 🛡Cybersecurity Enthusiast | 🖥Linux | Python🐍 | 🗿Philomath
🚀 Last night, I set a goal: complete the lab before heading to bed. Mission accomplished! The lab focused on the RedLine Stealer, also known as 'RecordStealer' malware. Given the malware hash, I uncovered crucial details such as the C2 IP address and port, the first URL called after execution, its MITRE ATT&CK tactic ID, and the DLL used for privilege escalation. Tools like VirusTotal and a few Google searches were instrumental in this discovery process. Excited to tackle more challenges on this platform! 💪 #CyberSecurity #MalwareAnalysis #ContinuousLearning #RedLineStealer #MITREATTACK
To view or add a comment, sign in
-
🚀 Wow, What an Incredible Journey in Data Hashing! Explore Our Bell Geekfest 2023 Hackathon Project on GitHub! 🚀 Hello, everyone, I can't contain my excitement as I share the remarkable journey of Team CodeFactory in the Bell Geekfest 2023 Hackathon, where the focus was on "Online Privacy and Security." It was nothing short of awe-inspiring! 💫 Garry Mittal, Meghna Ramsnehi, and I teamed up to take on the challenge of designing an efficient data hashing system in just one day. The experience was truly exhilarating! 💻🛡️ Here's the best part: you can explore our project on GitHub by following this link: [GitHub Project - Bell Geekfest 2023](https://lnkd.in/gSnjUbKS). Your thoughts, questions, and support would mean the world to us. Dive in and let us know what you think. This journey wouldn't have been the same without you! 🙌 Bell #BellGeekfest2023 #HackathonProject #DataHashing #OnlinePrivacy #Cybersecurity #GitHub #TechInnovation #TeamCodeFactory #TeamBell #TeamBells
To view or add a comment, sign in
-
-
Are you curious about what it's like to be a TEALS volunteer? Check out this article from multi-year volunteer, Bandhan Preet K. https://lnkd.in/gzj3ZXKa TEALS volunteers make a huge impact for the communities that they serve. Find out more about how you can help increase access to computer science education for students across the US https://lnkd.in/gTjemdVb
With the phenomenal Matthew Williams at Hacking with the homies Dev conference! As a software developer in Detroit, if you aren’t in TEALS, what are you doing?!?! Checkout this article on how you can get involved with TEALS and provide tech access to Detroit’s Black and Brown students > https://lnkd.in/gzj3ZXKa Make a difference today > https://lnkd.in/gsDGwYNW
To view or add a comment, sign in
-
-
Cyber Security Analyst | SOC Analyst T1 | eCIR | OSCP | Linux | Qradar | Security onion | CTF player | Network security | ITI | MCIT | DEPI | NTI
I successfully completed WebStrike Blue Team Lab at CyberDefenders 👨💻👨💻 An anomalous finding within our company's internal network led me to discover an unusual file on one of our servers. Suspecting potential malicious activity, I compiled a pcap file containing vital network traffic for further analysis. My team has been assigned the task of analyzing the pcap file. #wireskark #IncidentResponse #NetworkForensics #digitalForensics #Cybersecurity #InfoSec #SOC #ITSecurity #CyberDefenders #EndpointForensics #PcapAnalysis #WireShark #blueteam #DFIR #Networksecurity #Mhmdlotfy3
WebStrike blue team lab.
cyberdefenders.org
To view or add a comment, sign in
-
Cyber Security Analyst | SOC Analyst T1 | eCIR | OSCP | Linux | Qradar | Security onion | CTF player | Network security | ITI | MCIT | DEPI | NTI
I successfully completed Redline Blue Team Lab at CyberDefenders 👨💻👨💻 To analyze the memory dump, I used the Redline and Volatility tools . Steps taken on the compromised device included identifying malware families and bypassing the network backup system (NIDS). - Use Redline and Volatility to analyze memory dumps. - Malware families and NIDS bypass have been identified. - Detecting traces of shock or mild shocks left on the device. The malware used in the attack and its characteristics were identified during the analysis process. In addition, slight shocks or shocks were observed on the compromised system. #IncidentResponse #NetworkForensics #Cybersecurity #InfoSec #ITSecurity #Wireshark #CyberDefenders #EndpointForensics #CyberSecurity #blueteam #SOC #DFIR #Mhmdlotfy3
RedLine blue team lab.
cyberdefenders.org
To view or add a comment, sign in
-
SVP APJ @Filigran | OpenCTI - Know your adversaries | Cybersecurity leader I GTM APJ I Advisory Board Member I Passionate about building successful businesses and great teams, and making the Internet a safer place.
Great opportunity to catch up with Samuel Hassine and Julien Richard, founders of Filigran, and ask them anything about #OpenCTI and #OpenBAS! Questions can be submitted in advance, and the session will be recorded if you can’t make it on the day. See you there! #cyberthreatintelligence #threatintelligence #breachandattacksimulation
📢 We’re thrilled to launch our new 𝗙𝗶𝗹𝗶𝗴𝗿𝗮𝗻 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝘁𝘆 𝗤&𝗔 event series! An opportunity to connect directly with us and engage in discussions with key members of our team, live! Our inaugural session, on May 30th, will feature our founders, Samuel Hassine, CEO of Filigran, and Julien Richard, CTO of Filigran 🔥. This is your chance to ask anything about our platforms and brand, such as: ▪ Feature Demos, ▪ Specific Feature inquiries, ▪ Platform Roadmap, ▪ Platform Usage Support. 📝 Feel free to send your questions in advance via this form: https://lnkd.in/dV45vJDi 𝗦𝗮𝘃𝗲 𝘁𝗵𝗲 𝗱𝗮𝘁𝗲! 📆 May 30 ⏰ 6pm CET / 9am PDT Don’t miss out on this unique opportunity to engage with our team. Sign up now: https://lnkd.in/dpiTU2Uu Can't make it? Don't worry, the event will be recorded! See you there! #Liveevent #Cybersecurity #ThreatIntelligence
Filigran Community Q&A #1
streamyard.com
To view or add a comment, sign in
-
Cyber Security Analyst | SOC Analyst T1 | eCIR | OSCP | Linux | Qradar | Security onion | CTF player | Network security | ITI | MCIT | DEPI | NTI
I successfully completed Hacked Blue Team Lab at CyberDefenders!👨💻 #IncidentResponse #DigitalForensics #Cybersecurity #InfoSec #ITSecurity #CyberDefenders #EndpointForensics #NetworkForensics #blueteam #SOC #DFIR #Mhmdlotfy3
Hacked blue team lab.
cyberdefenders.org
To view or add a comment, sign in
-
Back from #infoseceurope. I’m exhausted, but in a good way. Was really nice to catch up with old friends (and make new ones) Goher Mohammad , Dr Mike Brass (CISSP, CIPPE/E, CISM, CRISC) , Louis R. Kishor Makwana and Nigel Howarth Of course I was very interested to see what was happening in the startup corner. Three highlights: 1. Speaking with the incredible founders of CoGuard and their very unique tool that is addressing a problems presented by IaS (like misconfiguration and unnecessary complexity) that’s definitely ahead of the curve. 2. Had a good chat with Alon Navon about security tools that actually do something, like Seal Security that actually patches stuff that we’ve come to accept as “unfixable”. 3. Caught Xavier Bellekens presentation about one of my favourite topics; security deception. I enjoyed chatting with with Robbie Binnie about Lupovis ‘s take on creating a deception programme. Finally, thanks to the team at infoseceurope who gifted me with a caricature of myself in exchange for a nice chat.
To view or add a comment, sign in
-
-
Completed Network Forensics challenge in OpenWire Blue Team Lab, enhancing skills in analyzing traffic and identifying threats. Highly recommend for hands-on cybersecurity learning. #OpenWireBlueTeamLab #NetworkForensics #Cybersecurity
OpenWire blue team challenge.
cyberdefenders.org
To view or add a comment, sign in
-
Thrilled to announce that I've successfully completed the "Open Wire" challenge, a comprehensive cybersecurity test that pushed my skills to the limit. 💻🔒👨💻 Grateful for the learning opportunities, and proud to be part of a community dedicated to staying ahead of cyber threats. Challenges like these fuel my passion for cybersecurity and continuous improvement. 🌐 #CyberSecurity #OpenWireChallenge #CyberDefender #InfoSec #SecurityJourney #CyberAware #ContinuousLearning #Networking #SecurityFirst #DigitalDefense #TechChallenge #CyberHeroes 🤗
OpenWire blue team challenge.
cyberdefenders.org
To view or add a comment, sign in