Merge version_1 into main #1
@@ -64,7 +64,7 @@ export default function LandingPage() {
|
||||
handle: "@cybersec",
|
||||
testimonial: "The insights into social engineering vectors were absolutely eye-opening for our team.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg?_wi=1",
|
||||
imageAlt: "cybersecurity dashboard tech background",
|
||||
},
|
||||
{
|
||||
@@ -72,7 +72,7 @@ export default function LandingPage() {
|
||||
handle: "@netsec",
|
||||
testimonial: "Finally, a source that explains complex attack patterns in simple, actionable terms.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg?_wi=1",
|
||||
imageAlt: "phishing protection cyber security icon",
|
||||
},
|
||||
{
|
||||
@@ -80,7 +80,7 @@ export default function LandingPage() {
|
||||
handle: "@infosec",
|
||||
testimonial: "An essential hub for anyone serious about understanding modern exploitation techniques.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg?_wi=1",
|
||||
imageAlt: "encrypted server network architecture",
|
||||
},
|
||||
{
|
||||
@@ -88,7 +88,7 @@ export default function LandingPage() {
|
||||
handle: "@ethicalhack",
|
||||
testimonial: "The methodologies covered here are standard industry knowledge now.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg?_wi=1",
|
||||
imageAlt: "penetration testing code analysis",
|
||||
},
|
||||
{
|
||||
@@ -96,11 +96,11 @@ export default function LandingPage() {
|
||||
handle: "@itsecure",
|
||||
testimonial: "Excellent documentation of current cyber threats and defense strategies.",
|
||||
rating: 5,
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg?_wi=1",
|
||||
imageAlt: "modern office dark laptop screen",
|
||||
},
|
||||
]}
|
||||
imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg"
|
||||
imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg?_wi=2"
|
||||
imageAlt="Security dashboard interface"
|
||||
mediaAnimation="blur-reveal"
|
||||
avatars={[
|
||||
@@ -173,19 +173,19 @@ export default function LandingPage() {
|
||||
{
|
||||
title: "Phishing & Social Engineering",
|
||||
description: "Manipulating individuals to disclose sensitive information through deceptive messaging tactics.",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg?_wi=2",
|
||||
imageAlt: "Phishing protection",
|
||||
},
|
||||
{
|
||||
title: "Encryption Exploitation",
|
||||
description: "Analyzing vulnerabilities in outdated cryptographic protocols to intercept secure data.",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg?_wi=2",
|
||||
imageAlt: "Encrypted servers",
|
||||
},
|
||||
{
|
||||
title: "Automated Scanning",
|
||||
description: "Systematic vulnerability analysis of network perimeters to discover exposed endpoints.",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg?_wi=2",
|
||||
imageAlt: "Source code scan",
|
||||
},
|
||||
]}
|
||||
@@ -260,7 +260,7 @@ export default function LandingPage() {
|
||||
tag="Stay Updated"
|
||||
title="Get Our Security Newsletter"
|
||||
description="Join thousands of security professionals receiving the latest research on hacker methodologies."
|
||||
imageSrc="http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg"
|
||||
imageSrc="http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg?_wi=2"
|
||||
imageAlt="Security workstation"
|
||||
mediaAnimation="slide-up"
|
||||
/>
|
||||
@@ -268,7 +268,7 @@ export default function LandingPage() {
|
||||
|
||||
<div id="footer" data-section="footer">
|
||||
<FooterMedia
|
||||
imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg"
|
||||
imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg?_wi=3"
|
||||
logoText="CyberGuard"
|
||||
columns={[
|
||||
{
|
||||
|
||||
Reference in New Issue
Block a user