chore: add resource under cyber-security:security-skills-and-knowledge:other-attacks:buffer-overflow

pull/4143/head
roadmap bot 1 year ago
parent e36ff7bdd6
commit 522b00612a
  1. 2
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md

@ -29,3 +29,5 @@ To prevent and mitigate buffer overflow vulnerabilities, the following strategie
- Regularly scan code for vulnerabilities and conduct security audits. - Regularly scan code for vulnerabilities and conduct security audits.
By being aware of buffer overflow vulnerabilities and implementing these preventive strategies, you can protect your software from potential attacks and keep your systems secure. By being aware of buffer overflow vulnerabilities and implementing these preventive strategies, you can protect your software from potential attacks and keep your systems secure.
- [Buffer Overflows (Hacksplaining)](https://www.hacksplaining.com/exercises/buffer-overflows)
Loading…
Cancel
Save