INFOSEC Secjuice Squeeze Volume 16 Welcome to the 16th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed.
INFOSEC Secjuice Squeeze Volume 15 Welcome to the 15th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed.
INFOSEC Acquisition Activity In The Browser Isolation Cybersecurity Space A closer look at acquisition activity within the browser isolation space.
OSINT Make Your Own Custom OSINT Bookmarklets (p2) Part two of Sinwindie's guide to creating custom Javascript bookmarklets for help you during OSINT investigations.
INFOSEC Removing Sensitive Data & Plaintext Secrets from GitHub Learn how to clean your GitHub history, repository and pull requests containing sensitive data (like passwords), and prevent developers from committing secrets.
INFOSEC Squeeze Volume 14 - KidsGuard, VPN backdoors, Bluetooth, MGM & more! Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
CYBERSEC Secjuice Hall Of Fame The Secjuice Hall Of Fame, where we immortalize legendary Secjuice members, volunteers who made a difference and writers who contribute to our project.
OSINT Make Your Own Custom OSINT Bookmarklets (p1) Learn how to build your own custom OSINT bookmarklet tools with this how-to guide and sample code!
INFOSEC Squeeze Volume 13 - Voting, Blockchain, DDoS, Malware, & more! Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
UNUSUAL JOURNEYS INTO INFOSEC Unusual Journeys into Infosec Featuring Rik Ferguson We join Rik Ferguson (VP of Security Research for Trend Micro), as we explore his unusual Journey into infosec.
TECHNICAL ModSecurity Denial of Service Details and PoC CVE-2019-19886 Security researcher Andrea Menin tells us the story of vulnerabilities he found in libModSecurity.
INFOSEC Squeeze Volume 12 - sudo, Cisco, WhatsApp, and Android Bluetooth bugs & more! Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
INFOSEC International Hacking Scenes: Indonesia Paying homage to the original Phrack international scene philes, we take a closer look at the Indonesian hacker scene.
TECHNICAL Apple iCloud Credential Stealing Better phishing with CVE-2020-3841 from security researcher Sebastian Bicchi and his red team exercise.
INFOSEC OSINT Amateur Hour What happens when two complete newcomers to the art of open-source intelligence try their hand at a geolocation challenge?
INFOSEC Infosec Writers Challenge Welcome to the Triple Ten, an infosec writers challenge open to anyone who likes to write about cyber or information security.
INFOSEC Squeeze Volume 11 - Google bounties, TrickBot, Iranian hackers & more! The Secjuice Squeeze, a curated selection of interesting infosec articles that you may have missed.
INFOSEC Squeeze Volume 10 - AWS Leaks Keys, FedEx Scam, IoT, Mac Trojan, & More Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
TECHNICAL Vehicle Hacking Part 1: Understanding the Attack Surface Car Hacking 101 - Understanding the attack surface and mapping out basic threat modelling for cars IO points.
OSINT Bugs. Easy To Find, Tough To Report The trials and tribulations of a bug hunter trying to report a bug.
OSINT Pokémon GO OSINT Techniques: Part II In part two of Sinwindie's Pokemon OSINT series we move beyond screenshots to gather intelligence from users that you have befriended.
INFOSEC Squeeze Volume 9 - NSA Discloses Windows Flaw, Cellebrite Buys BlackBag, P&B Bank Hacked, & More Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
TECHNICAL Quantum Computing 101 - Part Two (Shor's Algorithm) Welcome to part two of our series on Quantum Computing, in which security research Kaboom hurts our heads with math by explaining Shors Algorithm.
OSINT Trawling for Fishermen - Investigating a Chinese Honeynet Join OSINT hunter N0mad as he investigates a Chinese honeynet that lights up like a Christmas tree.
CYBERSEC Featured The Cybersecurity Skill Shortage Goes Beyond a Government Responsibility The cybersecurity is facing a skill shortage. Learn why it matters and the efforts underway to address it.