The Human Firewall: People-First Cybersecurity

The Human Firewall: People-First Cybersecurity

Dr. Aleise McGowan⁠, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week’s episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and human-centered leadership. She talks about what separates good and great leaders during the first hours of an incident response and why delayed action equals exponential damage. She also spotlights her work with BlackGirlsHack, a rapidly growing nonprofit that opens doors for underrepresented talent in cyber, and makes the case that building an inclusive security workforce isn’t just the right thing to do, it’s the smart thing to do.

Read More
Secure Your Summer: Top Cyber Myths, Busted

Secure Your Summer: Top Cyber Myths, Busted

In this episode of Threat Vector, ⁠David Moulton⁠ talks with ⁠Lisa Plaggemier⁠, Executive Director of the ⁠National Cybersecurity Alliance⁠. Lisa shares insights from this year’s “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, storytelling, and system design all play a role in protecting users. Learn why secure-by-design is the future, how storytelling can reshape behavior, and why facts alone won’t change minds. This episode is a must-listen for CISOs, security leaders, and anyone working to reduce human risk at scale.

Read More
How to: Use Shodan with Metasploit

How to: Use Shodan with Metasploit

1 Launch Metasploit # Update msf database and launch msfconsole sudo msfdb init && msfconsole 2 Search shodan auxiliary search shodan type:auxiliary 3 Select module use auxiliary/gather/shodan_search 4 To show necessary parameters we can use following command show options In order to use this module we need to configure 2 required parameters QUERY, SHODAN_APIKEY 5 […]
The post How to: Use Shodan with Metasploit appeared first on Blog-D without Nonsense.

Related posts:
How to: Use Metasploit/msf to scan hosts’ ports in LAN in Kali Linux
How to Install Nessus on Kali Linux
How to: Fix OpenVAS – command not found in Kali Linux 2020.2a
Two Free Webshell Scanner/ Webshell detection tools
FakeNet-NG – Next Generation Dynamic Network Analysis Tool (Monitor network traffic of programs/software)
Vulnerability Scanner/Attack surface mapping software/program
How to: Detect alive hosts and ports within LAN using different methods/techniques/tools
How to audit Linux/Debian/Ubuntu/CentOS etc. with Lynis
How to Fix Firefox can’t establish a connection to the server at 127.0.0.1:9392 (OpenVAS, Greebone) on Kali Linux
One-Lin3r – Penetration test with one line (Installation on Kali Linux)

Read More
X