Merge version_1 into main #1

Merged
bender merged 1 commits from version_1 into main 2026-04-04 21:57:47 +00:00

View File

@@ -64,7 +64,7 @@ export default function LandingPage() {
handle: "@cybersec",
testimonial: "The insights into social engineering vectors were absolutely eye-opening for our team.",
rating: 5,
imageSrc: "http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg?_wi=1",
imageAlt: "cybersecurity dashboard tech background",
},
{
@@ -72,7 +72,7 @@ export default function LandingPage() {
handle: "@netsec",
testimonial: "Finally, a source that explains complex attack patterns in simple, actionable terms.",
rating: 5,
imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg?_wi=1",
imageAlt: "phishing protection cyber security icon",
},
{
@@ -80,7 +80,7 @@ export default function LandingPage() {
handle: "@infosec",
testimonial: "An essential hub for anyone serious about understanding modern exploitation techniques.",
rating: 5,
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg?_wi=1",
imageAlt: "encrypted server network architecture",
},
{
@@ -88,7 +88,7 @@ export default function LandingPage() {
handle: "@ethicalhack",
testimonial: "The methodologies covered here are standard industry knowledge now.",
rating: 5,
imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg?_wi=1",
imageAlt: "penetration testing code analysis",
},
{
@@ -96,11 +96,11 @@ export default function LandingPage() {
handle: "@itsecure",
testimonial: "Excellent documentation of current cyber threats and defense strategies.",
rating: 5,
imageSrc: "http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg?_wi=1",
imageAlt: "modern office dark laptop screen",
},
]}
imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg"
imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg?_wi=2"
imageAlt="Security dashboard interface"
mediaAnimation="blur-reveal"
avatars={[
@@ -173,19 +173,19 @@ export default function LandingPage() {
{
title: "Phishing & Social Engineering",
description: "Manipulating individuals to disclose sensitive information through deceptive messaging tactics.",
imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg?_wi=2",
imageAlt: "Phishing protection",
},
{
title: "Encryption Exploitation",
description: "Analyzing vulnerabilities in outdated cryptographic protocols to intercept secure data.",
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg?_wi=2",
imageAlt: "Encrypted servers",
},
{
title: "Automated Scanning",
description: "Systematic vulnerability analysis of network perimeters to discover exposed endpoints.",
imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg?_wi=2",
imageAlt: "Source code scan",
},
]}
@@ -260,7 +260,7 @@ export default function LandingPage() {
tag="Stay Updated"
title="Get Our Security Newsletter"
description="Join thousands of security professionals receiving the latest research on hacker methodologies."
imageSrc="http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg"
imageSrc="http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg?_wi=2"
imageAlt="Security workstation"
mediaAnimation="slide-up"
/>
@@ -268,7 +268,7 @@ export default function LandingPage() {
<div id="footer" data-section="footer">
<FooterMedia
imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg"
imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg?_wi=3"
logoText="CyberGuard"
columns={[
{