UNUSUAL JOURNEYS INTO INFOSEC Unusual Journeys into Infosec Featuring Phillip Wylie Learn about Philip Wylie's journey into infosec, including bear wrestling, getting shot, and overcoming some major challenges.
INFOSEC Four-Step Intelligence Model for Decision Making Mars Groves explains the four steps of the OODA Loop model used in intelligence for decision-making, which is very useful for difficult and time-sensitive situations.
Five Serverless Security Tools You Need To Adopt Right Now Heads up! You can improve the security of your serverless project using free or open source solutions that are already out there.
BUYING CRYPTO WITH YOUR LLC Securing Corporate Crypto: Why Your LLC’s Private Keys Matter More Than You Think The moment your LLC decides to buy cryptocurrency, you’ve crossed a threshold that most business owners never consider: you’re now responsible for securing private keys that represent real value, but traditional corporate security frameworks were never designed for crypto.
OSINT The OSINT Intelligence Cycle Part 1: Planning and Direction My advice for those wishing to improve their OSINT skills is to go back to the basics, namely the intelligence cycle.
OSINT OSINT & The Intelligence Cycle Part II: Lets Talk About Collection Part two of my guide to the OSINT intelligence cycle. Once you mapped out your planning and direction phase, the next step is collection.
OSINT OSINT & The Intelligence Cycle Part III: Processing Raw Intelligence This OSINT part 3 post explains how to take the raw intelligence and refines it into forms better suited for exploitation and analysis.
OSINT OSINT & The Intelligence Cycle Part IV: Analysis and Production After the processing phase of the OSINT intelligence cycle, it is time to analyze the data and generate an intelligence product.
OSINT OSINT & The Intelligence Cycle Part Five: Dissemination Legend intelligence analyst Sinwindie returns with Part Five in his series on the OSINT Intelligence Cycle.
INFOSEC SecjuiceCON 2025 SecjuiceCON, our first virtual conference, will be held on March 30, 2025, starting at noon America/New_York timezone.
HTB Escape Walkthrough A very specific Windows machine, in which I found myself stuck, persistently searching for an exploit that later revealed itself to be a straightforward clue that facilitated a trivial privilege escalation. The subsequent privilege escalation led me to the desired root flag.
TECHNICAL HTB Stocker Walkthrough Simple BOX on both flags, much more root than the user, still fun and great for beginners.
TECHNICAL HTB Busqueda Walkthrough A nice and simple BOX with two relatively simple exploits even for beginners.
TECHNICAL HTB PC Walkthrough Let’s talk about another relatively simple BOX. It starts unusually, but it quickly reveals its true nature: simplicity. Let’s avoid unnecessary descriptions.
TECHNICAL HTB Topology Walkthrough This box is incredibly intriguing, especially the first part. However, the search for the appropriate exploit proved to be quite challenging. It required a more sophisticated user flag than the root flag.
TECHNICAL HTB Keeper Walkthrough A simple yet intriguing BOX that piqued my interest for personal reasons this time. Apart from a few minor unexpected hiccups, I successfully cracked it with straightforward steps that are accessible to even beginners. An excellent BOX for learning.
TECHNICAL HTB Analytics Walkthrough The BOX is a great starting point for beginners, especially those who are new to the field. It’s easy to use and execute, apart from a few minor issues that don’t affect its simplicity.
TECHNICAL HTB Outdated Walkthrough This Windows Box is incredibly intriguing, featuring challenging passages and an unstable machine. Despite these difficulties, it’s an enjoyable experience with numerous exploits available.
TECHNICAL HTB MetaTwo Walkthrough A simple box with a user flag is slightly more intricate than the root flag, yet it still challenges the patience and resilience of a penetration tester.
crypto Why You Need A Crypto LLC A crypto LLC is a must have for any serious trader, it provides legal protection, operational efficiency, and financial advantages that can be pivotal for long-term success.
cryptocurrency Cryptocurrency & Blockchain Technology Regulations The asset class has yet to be declared by the regulators and this is where the currency vs security debate begins.
TECHNICAL Featured Infostealers: An Overview We’ll dive into the sneaky world of infostealers, malware that steals your secrets like a ninja!
INFOSEC The CMMC Countdown, Part 4 This high-level review of the five-point controls required for a conditional certificate will wrap up the CMMC action plan.
TECHNICAL HTB Socket Walkthrough Learn how a vulnerability in a WebSocket application was discovered and exploited using SQL injection.