INFOSEC Secjuice Squeeze Volume 21 Welcome to the 21st edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, and upcoming events–lovingly prepared for you every week.
TECHNICAL Cybersecurity for Beginners - Part 3: Weaponization Part three in Andy's Cybersecurity For Beginners series. In this episode he enthusiastically covers weaponization.
CYBERSEC Zoom Privacy and Security Woes A short article on Zoom'z recent security and privacy woes, written from the perspective of a hacker.
INFOSEC Windows Forensics: Artifacts (1) The first article in our series on Windows Forensics from security researcher Hartoyo Wahyu, in this episode he covers artifacts.
INFOSEC Secjuice Squeeze Volume 20 Welcome to the 20th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed.
CYBERSEC Deep Learning & Cybersecurity: Part 2 The intersection of deep learning and cybersecurity, featuring two famous cyber attacks and their machine learning applications.
INFOSEC SARCON: SECARMY Conference 2020 Secjuice has officially become a community partner of SARCON 2020, a community-based information security virtual conference.
CYBERSEC You Can Run, But Can You Hide? A true crime story about tracking fugitives, written by a veteran OSINT hunter and former policeman.
INFOSEC SBA PPP Loan Phishing Attacks (COVID-19/Coronavirus) A closer look at load phishing attacks and a free solution to catch them in their tracks before you get caught.
TECHNICAL HTML5 Attacks - Episode 01 Part one in a series covering the different kinds of HTML5 attacks, in this episode we cover websocket attacks.
INFOSEC Secjuice Squeeze Volume 19 Welcome to the 19th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed.
CYBERSEC Deep learning & Cybersecurity (1) How Machine learning, Deep learning, and Artificial intelligence algorithms can intersect with cybersecurity
INFOSEC Reconnaissance for Beginners (2) A beginners guide to reconnaissance and how to investigate a target.
TECHNICAL HTB Traverxec Walkthrough Welcome to my write up of how I hacked the Traverxec box on HackTheBox!
OSINT LinkedIn OSINT Techniques (II) Welcome back to this two-part guide on how to extract open source intelligence information from LinkedIn.
CYBERSEC Zoom Fiesta An in-depth look at the recent security issues at Zoom, from security researcher Thunderson.
The Many Hats Club Isolation Con Our friends over at The Many Hats Club and their fantastic team of volunteers are hosting a (free-of-charge) virtual conference on the 19th of April to raise money for the Médecins Sans Frontières (MSF) aka Doctors Without Borders who are doing some fantastic work in developing countries hit hard by
CYBERSEC The Intersection Of SARS-CoV-2 And The Cybersecurity World Armchair epidemiologists have sprung up all over social media, so can cybersecurity researchers also have an informed opinion? I think so!
OSINT The 7 Deadly Sins of OSINT Curious to know just of many of these seven deadly OSINT sins that you are guilty of committing online?
INFOSEC Penetration Testing for Beginners (1) Interested in penetration testing? Welcome to Part 1 of our beginners guide to the noble art of pen testing.
TECHNICAL How To Bypass CSP By Hiding JavaScript In A PNG Image Hide a malicious JavaScript library in a PNG image and tweet it, then include it in a vulnerable website by exploiting a XSS bypassing its Content-Security-Policy (CSP).
INFOSEC Insecure Serverless Plugins: Why You Should Inspect the Source Code The Serverless Framework supports numerous plugins and they save so much time, but this convenience can come with a negative downside.
OSINT LinkedIn OSINT Techniques: Part I Linkedin users walk a fine line between giving out too little information, or giving out too much information.