INFOSEC The Covert Human Intelligence Sources (Criminal Conduct) Bill An analysis of the Covert Human Intelligence Sources (Criminal Conduct) Bill and the repercussions of it being passed into legislation.
INFOSEC How to Test your Business Continuity and Disaster Recovery Plan Testing is an essential part of cybersecurity business continuity and disaster recovery planning. Until you test your plans, all you have is theory.
TECHNICAL BugPoC XSS Challenge Writeup Bypassing Content-Security-Policy and escaping an iframe sandbox.
INFOSEC Secjuice Squeeze Volume 44 Welcome to 44th edition of the Secjuice Squeeze, a curated selection of security articles and infosec news that you may have missed.
INFOSEC How To Handle The Media During A Cybersecurity Breach One of the issues businesses face during a data breach is media obligations and how best to deal with communicating with the media.
INFOSEC Lying About Your Secret Security Answers is Not Lying "In wartime, truth is so precious that she should always be attended by a bodyguard of lies." - Winston Churchill.
OSINT OSINT & The Intelligence Cycle Part IV: Analysis and Production After the processing phase of the OSINT intelligence cycle, it is time to analyze the data and generate an intelligence product.
INFOSEC Improve Your Security Posture With An AI-Assisted Incident Response Platform A brief guide to the notion of AI-assisted incident and response platforms.
INFOSEC Secjuice Squeeze Volume 43 Welcome to the Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated weekly.
INFOSEC What To Do When You Are Ddosed Offline While Gaming Getting “booted” is a common term for someone kicking you off an online game by attacking your internet connection.
CYBERSEC Security Tips for the Software Development Lifecycle The software development life cycle is used to design and test software products, but each step has the possibility to introduce security risks.
CYBERSEC US Election Cybersecurity Increased As Cyber Threats Remain Strong Malicious actors have attempted to undermine the nation’s democracy and cyber threats in the form of disruption and misinformation remain strong.
INFOSEC Secjuice Squeeze Volume 42 Welcome to the Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated weekly.
CYBERSEC Leveraging the OSI Model to Prevent Cybersecurity Attacks Learn how addressing weaknesses in the physical, network, application, and human layers help prevent cybersecurity attacks.
TECHNICAL Phone numbers investigation, the open source way Learn the open source way to investigate international phone numbers.
INFOSEC A Journalist's Guide to Online Anonymity and Secure Communications It’s important for a journalist to be able to protect the confidentiality of their sources as well as their own online presence at times. In many cases, you will be publishing information that other people don’t want to be public.
INFOSEC Secjuice Squeeze Volume 41 Welcome to the Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated weekly.
OSINT Finding OSINT Eggs In Mobile Apps For a while, knowing how to view the source of a page or using developer tools was enough to access “hidden” treasures. But what about apps?
TECHNICAL TryHackMe Writeup: ToolsRus A writeup of the TryHackMe ToolRus box teaching how to use common tools to get a foothold in a webserver.
OSINT How to Clean Up Your Digital Footprint Learn how to clean up your digital footprint and reduce your overall risk from being caught out with OSINT.