A Short Guide to Malware Malware stands for malicious software, and it's any piece of code that does something harmful to a computer system.
INFOSEC Secjuice Squeeze Volume 46 Welcome to the Secjuice Squeeze, a curated selection of security articles and infosec news that you may have missed.
CYBERSEC Cyberattack Next Steps Getting hacked can be a scary time for a business, many people don’t know what to do or even where to begin.
CYBERSEC What Is Ethical Hacking? What is ethical hacking and how can it help your business? In this article we take a closer look at ethical hacking and the work of white hat hackers.
OSINT OSINT Investigation of Close Connections on Twitter If you are researching someone with a Twitter account, you can quickly identify their closest or strongest relationships.
INFOSEC Secjuice Squeeze Volume 45 Welcome to the Secjuice Squeeze, a curated selection of security articles and infosec news that you may have missed.
OSINT Domain Email OSINT Investigation Almost every website has at least one hidden email address that is directly linked to the website owner.
INFOSEC Why Are You Underpaid In Security? Tech careers enjoy a salary that is well above the average. But there is a common mistake that most people make that limits the money that they make.
INFOSEC The Covert Human Intelligence Sources (Criminal Conduct) Bill An analysis of the Covert Human Intelligence Sources (Criminal Conduct) Bill and the repercussions of it being passed into legislation.
INFOSEC How to Test your Business Continuity and Disaster Recovery Plan Testing is an essential part of cybersecurity business continuity and disaster recovery planning. Until you test your plans, all you have is theory.
TECHNICAL BugPoC XSS Challenge Writeup Bypassing Content-Security-Policy and escaping an iframe sandbox.
INFOSEC Secjuice Squeeze Volume 44 Welcome to 44th edition of the Secjuice Squeeze, a curated selection of security articles and infosec news that you may have missed.
INFOSEC How To Handle The Media During A Cybersecurity Breach One of the issues businesses face during a data breach is media obligations and how best to deal with communicating with the media.
INFOSEC Lying About Your Secret Security Answers is Not Lying "In wartime, truth is so precious that she should always be attended by a bodyguard of lies." - Winston Churchill.
OSINT OSINT & The Intelligence Cycle Part IV: Analysis and Production After the processing phase of the OSINT intelligence cycle, it is time to analyze the data and generate an intelligence product.
INFOSEC Improve Your Security Posture With An AI-Assisted Incident Response Platform A brief guide to the notion of AI-assisted incident and response platforms.
INFOSEC Secjuice Squeeze Volume 43 Welcome to the Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated weekly.
INFOSEC What To Do When You Are Ddosed Offline While Gaming Getting “booted” is a common term for someone kicking you off an online game by attacking your internet connection.
CYBERSEC Security Tips for the Software Development Lifecycle The software development life cycle is used to design and test software products, but each step has the possibility to introduce security risks.
CYBERSEC US Election Cybersecurity Increased As Cyber Threats Remain Strong Malicious actors have attempted to undermine the nation’s democracy and cyber threats in the form of disruption and misinformation remain strong.
INFOSEC Secjuice Squeeze Volume 42 Welcome to the Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated weekly.
CYBERSEC Leveraging the OSI Model to Prevent Cybersecurity Attacks Learn how addressing weaknesses in the physical, network, application, and human layers help prevent cybersecurity attacks.