diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md index 24ed4c95e..b3484e076 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md +++ b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/other-attacks/100-buffer-overflow.md @@ -29,3 +29,5 @@ To prevent and mitigate buffer overflow vulnerabilities, the following strategie - Regularly scan code for vulnerabilities and conduct security audits. By being aware of buffer overflow vulnerabilities and implementing these preventive strategies, you can protect your software from potential attacks and keep your systems secure. + +- [Buffer Overflows (Hacksplaining)](https://www.hacksplaining.com/exercises/buffer-overflows) \ No newline at end of file