TECHNICAL Featured Infostealers: An Overview We’ll dive into the sneaky world of infostealers, malware that steals your secrets like a ninja!
INFOSEC The CMMC Countdown, Part 4 This high-level review of the five-point controls required for a conditional certificate will wrap up the CMMC action plan.
TECHNICAL HTB Socket Walkthrough Learn how a vulnerability in a WebSocket application was discovered and exploited using SQL injection.
OSINT Featured Using Newly Surfaced Data Breaches for OSINT Research Data Breach Search Engines (DBSEs) collect and organize leaked information from data breaches, enabling OSINT investigators to access it.
INFOSEC The CMMC Countdown: The Action Plan, Part 3 Continue your CMMC action plan with this high-level review of the five-point controls required to get a conditional certificate.
TECHNICAL HTB Precious Walkthrough Learn how to hack the box with this simple, vulnerable box. A simple nmap scan reveals a web page converter with a vulnerability in the pdfkit tool.
TECHNICAL HTB Soccer Walkthrough Learn how to break into a soccer portal using vulnerabilities in the Tiny File Manager hidden route.
TECHNICAL HTB MonitorsTwo Walkthrough Learn how to exploit a vulnerable Catci instance in this hack the box post.
INFOSEC Featured SecjuiceCON 2025 Come and host a talk at SecjuiceCON, our very first virtual conference! Submit your speaker presentation abstract by December 31, 2024.
INFOSEC The CMMC Countdown: The Action Plan, Part 2 Start your CMMC action plan with this high-level review of the five-point controls required to get a conditional certificate.
MALWARE Understanding the Black Basta Ransomware Service Learn how Black Basta’s double extortion tactics works.
TECHNICAL Age Verification: An Analysis of its Effectiveness & Risks Age verification laws have been suddenly rolling out in the USA. In this article, we will navigate through a complex analysis, as I seek to stimulate your thoughts rather than impose conclusions. Today's discussion centers on age verification protocols implemented on pornography websites.
OSINT Political Donations - OSINT Explore tools like FEC, Open Secrets, and state databases to research individual political donations and donor details easily.
TECHNICAL HTB Pilgrimage Walkthrough Search for flags using tools like nmap and ImageMagick, identify vulnerabilities, exploit them, find user credentials, and capture flags. Happy hacking the box!
HTB Jupiter Walkthrough Discover how temporary files can provide information for getting access to a Jupyter notebook.
HTB Ambassador Walkthrough Discover how using an access token can allow breaking into a development server.
OSINT Ethereum Reboots Crypto Investigation The smart blockchain created a crypto ecosystem of NFTs, DeFi, and Dapps, along with new kinds of investigations.
News Timeline and Details of the Change Healthcare Breach Discover how this healthcare breach unfolds and learn crucial defense strategies. Dive into our expert analysis for actionable insights.
OSINT How I Research a Bitcoin Wallet's Past: OSINT for Cryptocurrency Investigation Part 2 Explore the intricate world of Bitcoin address research using Blockchair and Oxt.me. Learn to uncover transaction details and patterns for deeper insights into crypto activity.
OSINT The UK OSINT Community: Working To Boost Sovereign Intelligence Capabilities British OSINT practitioners are flocking to join the new UK OSINT Community in support of their mission to bolster sovereign intelligence capabilities.
OSINT Featured The Basics of OSINT for Cryptocurrency Investigation: Part 1 New to cryptocurrencies? Learn to investigate addresses step-by-step, from blockchain explorers to scam databases in our beginner's guide.
HTB Timelapse Walkthrough I solved the hack-the-box for a Windows machine that was giving me problems. This is how I solved it to get the admin password.