INFOSEC Lying About Your Secret Security Answers is Not Lying "In wartime, truth is so precious that she should always be attended by a bodyguard of lies." - Winston Churchill.
OSINT OSINT & The Intelligence Cycle Part IV: Analysis and Production After the processing phase of the OSINT intelligence cycle, it is time to analyze the data and generate an intelligence product.
INFOSEC Improve Your Security Posture With An AI-Assisted Incident Response Platform A brief guide to the notion of AI-assisted incident and response platforms.
INFOSEC Secjuice Squeeze Volume 43 Welcome to the Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated weekly.
INFOSEC What To Do When You Are Ddosed Offline While Gaming Getting “booted” is a common term for someone kicking you off an online game by attacking your internet connection.
CYBERSEC Security Tips for the Software Development Lifecycle The software development life cycle is used to design and test software products, but each step has the possibility to introduce security risks.
CYBERSEC US Election Cybersecurity Increased As Cyber Threats Remain Strong Malicious actors have attempted to undermine the nation’s democracy and cyber threats in the form of disruption and misinformation remain strong.
INFOSEC Secjuice Squeeze Volume 42 Welcome to the Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated weekly.
CYBERSEC Leveraging the OSI Model to Prevent Cybersecurity Attacks Learn how addressing weaknesses in the physical, network, application, and human layers help prevent cybersecurity attacks.
TECHNICAL Phone numbers investigation, the open source way Learn the open source way to investigate international phone numbers.
INFOSEC A Journalist's Guide to Online Anonymity and Secure Communications It’s important for a journalist to be able to protect the confidentiality of their sources as well as their own online presence at times. In many cases, you will be publishing information that other people don’t want to be public.
INFOSEC Secjuice Squeeze Volume 41 Welcome to the Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated weekly.
OSINT Finding OSINT Eggs In Mobile Apps For a while, knowing how to view the source of a page or using developer tools was enough to access “hidden” treasures. But what about apps?
TECHNICAL TryHackMe Writeup: ToolsRus A writeup of the TryHackMe ToolRus box teaching how to use common tools to get a foothold in a webserver.
OSINT How to Clean Up Your Digital Footprint Learn how to clean up your digital footprint and reduce your overall risk from being caught out with OSINT.
TECHNICAL HTB Blunder Walkthrough Welcome to another great HackTheBox writeup, this time Andy From Italy is tackling the Blunder box.
INFOSEC Secjuice Squeeze Volume 40 Welcome to the Secjuice Squeeze, a curated selection of interesting infosec articles and news that you may have missed. Now with upcoming events!
CYBERSEC Why I Wrote A Serverless Security Book Learn why cybersecurity writer, Miguel Calles decided to write the first-ever book on serverless security.
TECHNICAL TryHackMe Writeup-Vulnversity Learn how to bypass upload restrictions on a web server and gaining root access with this TryHackMe technical walkthrough.
TECHNICAL HTB Cache Walkthrough Welcome to another of my world famous HackTheBox walkthroughs, this time I am tackling the HTB Cache box, so lets jump right in!
TECHNICAL HTB Blackfield Walkthrough Welcome back to another HackTheBox machine pentesting session, this time we will tackle the Blackfield box.