CYBERSEC You Can Run, But Can You Hide? A true crime story about tracking fugitives, written by a veteran OSINT hunter and former policeman.
INFOSEC SBA PPP Loan Phishing Attacks (COVID-19/Coronavirus) A closer look at load phishing attacks and a free solution to catch them in their tracks before you get caught.
TECHNICAL HTML5 Attacks - Episode 01 Part one in a series covering the different kinds of HTML5 attacks, in this episode we cover websocket attacks.
INFOSEC Secjuice Squeeze Volume 19 Welcome to the 19th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed.
CYBERSEC Deep learning & Cybersecurity (1) How Machine learning, Deep learning, and Artificial intelligence algorithms can intersect with cybersecurity
INFOSEC Reconnaissance for Beginners (2) A beginners guide to reconnaissance and how to investigate a target.
TECHNICAL HTB Traverxec Walkthrough Welcome to my write up of how I hacked the Traverxec box on HackTheBox!
OSINT LinkedIn OSINT Techniques (II) Welcome back to this two-part guide on how to extract open source intelligence information from LinkedIn.
CYBERSEC Zoom Fiesta An in-depth look at the recent security issues at Zoom, from security researcher Thunderson.
The Many Hats Club Isolation Con Our friends over at The Many Hats Club and their fantastic team of volunteers are hosting a (free-of-charge) virtual conference on the 19th of April to raise money for the Médecins Sans Frontières (MSF) aka Doctors Without Borders who are doing some fantastic work in developing countries hit hard by
CYBERSEC The Intersection Of SARS-CoV-2 And The Cybersecurity World Armchair epidemiologists have sprung up all over social media, so can cybersecurity researchers also have an informed opinion? I think so!
OSINT The 7 Deadly Sins of OSINT Curious to know just of many of these seven deadly OSINT sins that you are guilty of committing online?
INFOSEC Penetration Testing for Beginners (1) Interested in penetration testing? Welcome to Part 1 of our beginners guide to the noble art of pen testing.
TECHNICAL How To Bypass CSP By Hiding JavaScript In A PNG Image Hide a malicious JavaScript library in a PNG image and tweet it, then include it in a vulnerable website by exploiting a XSS bypassing its Content-Security-Policy (CSP).
INFOSEC Insecure Serverless Plugins: Why You Should Inspect the Source Code The Serverless Framework supports numerous plugins and they save so much time, but this convenience can come with a negative downside.
OSINT LinkedIn OSINT Techniques: Part I Linkedin users walk a fine line between giving out too little information, or giving out too much information.
OSINT Scalable LinkedIn Username Hunting Automate the OSINT hunting of LinkedIn usernames and profiles using the users email addresses.
INFOSEC Secjuice Squeeze Volume 18 Welcome to the 18th edition of Secjuice Squeeze, a curated selection of interesting security articles and news that you may have missed.
TECHNICAL HTB Postman Walkthrough Now that its been retired, lets take a deep dive into the “Postman” machine on HackTheBox so I can show you how I went about hacking it!
CYBERSEC Remote Working Cybersecurity A closer look at some of the issues faced by cybersecurity teams grappling with the sudden exodus of workers from the office into their homes.
INFOSEC When Politicians Do Cybersecurity An insightful critique of the European Union's Cybersecurity Act, created by politicians rather than infosec people.
INFOSEC Secjuice Squeeze Volume 17 Welcome to the 17th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed.
INFOSEC Creating A Cybersecurity Dictionary Why should you consider creating a cybersecurity dictionary for your organization? #understanding
TECHNICAL HTB "Eat the Cake!" Challenge An excellent write up of the 'Eat The Cake' challenge on HackTheBox.