INFOSEC Understanding the Implications of the Europcar Data Breach In recent years, data breaches have become a concerning trend, affecting companies across various industries. One such incident involved Europcar, a prominent car rental company, which was embroiled in controversy following claims of a massive data breach affecting millions of its customers. However, as investigations unfolded, it became apparent that
INFOSEC The CMMC Countdown: Why Your Company Needs to Prepare for 2025 Now, Part 1 Prepare your company for CMMC 2.0 compliance by 2025 with our guide on Azure tenant selection and System Security Plan creation to stay ahead in cybersecurity readiness.
INFOSEC Data Breaches and the Role of Stolen Credentials in 2023 Tom Caliendo unravels the intricate web of U.S. data breaches, spotlighting the rise of stolen credentials and the shadowy underworld of the dark web driving these cyber threats.
INFOSEC Featured Cyber Threat Intelligence Get a peak into Ross Moore's guide on Cyber Threat Intelligence (CTI), exploring its vital role in reshaping modern cybersecurity strategies.
TECHNICAL Featured An Introduction to Buffer Overflow #4: Overwriting the Stack Gurkirat Singh reveals how to overwrite the stack with buffer overflows and uncovers low-level vulnerabilities, providing detailed debugging insights.
INFOSEC Featured The Ethics of China's AI-Powered Surveillance State Discover the intricate dynamics of China's AI-driven surveillance state, exploring the convergence of facial recognition technology with governmental oversight and its profound implications on global human rights and individual privacy.
TECHNICAL HTB UpDown Walkthrough Explore how Andy From Italy tackles the Hack The Box UpDown challenge, a Linux-based machine featuring exposed SSH and Apache servers.
TECHNICAL Reverse Analysis on Windows - A First Look Dig deep into advanced debugging with Visual Studio and x64dbg: breaking and modifying game rules on Windows, and mastering single-step analysis and instruction edits for optimized code execution.
TECHNICAL Reverse Analysis on Windows - Hands-on 1 fairycn explores the intricate process of bypassing battery detection during BIOS upgrades on the Thankpad T430I using Windows 10, diving deep into reverse analysis with tools like x64dbg and gleaning insights from real-world troubleshooting challenges.
TECHNICAL x64dbg usage log: start debugging and modify a program Explore the comprehensive guide by fairycn on how to master x64dbg on Windows 11, from installation to advanced debugging techniques, ensuring effective program modifications and insightful CPU disassembly analysis.
TECHNICAL Reverse Analysis under Linux - A First Look Dive into the intricacies of reverse analysis on Linux with fairycn, mastering tools like gcc, edb-debugger, and ghidra in UOS Home Edition 21.3, while delving into command parsing, debugging, and decompilation techniques.
TECHNICAL Featured HTB Shared Walkthrough Andy From Italy gives a complete step-by-step guide on the Hack The Box Shared Walkthrough.
TECHNICAL Featured A Guide to Malware Analysis: Day 4 Security researcher fairycn reveals how to conduct malware analysis and mitigate malware threats from Word Macro viruses to Linux viruses, as well as exploit overflow vulnerabilities.
TECHNICAL A Guide to Malware Analysis: Day 3 Get deeper into malware analysis with security researcher fairycn and learn about dll injection, how to use the Huorong System Diagnostics Toolkit for monitoring, and how malware leverages networks for remote attacks.
TECHNICAL A Guide to Malware Analysis: Day 2 On day two of Malware Analysis, fairycn unveils program static analysis, string checking, PE structure, and linking methods, including tools and techniques for shelling, obfuscation, and anti-obfuscation.
TECHNICAL Featured A Guide to Malware Analysis: Day 1 Security researcher fairycn delivers a comprehensive guide to malware analysis, explaining how to understand and prevent computer viruses.
TECHNICAL An Introduction to Buffer Overflow #3 : (Un)Winding of Stack In the third part of the Buffer Overflow series, Gurkirat Singh delivers a detailed explanation on how to (un)wind a stack and prevent a type of buffer overflow attack called stack canaries. Pentesters and security enthusiasts will love this!
TECHNICAL HTB Inject Walkthrough Learn how to execute a path traversal attack on a web server and do much more naughty stuff with the retired HTB Inject BOX!
CTF Featured Can an AI win a CTF? ChatGPT vs HTB! Can ChatGPT outsmart a CTF challenge? Dive into security researcher Andy From Italy's journey to uncover the AI's potential against Hack the Box!
TECHNICAL HTB Investigation Walkthrough Explore the world of reverse engineering with our HTB Investigation Walkthrough, as we navigate layered security and unveil critical cyber strategies, from masterful enumeration to deft privilege escalation.
TECHNICAL HTB Noter Walkthrough Master the art of flask cookie forging and exploit the power of MySQL in this comprehensive Hack The Box Noter Walkthrough.
OSINT Featured Hunting the Hunters: Tracing Human Traffickers Take a deep dive into how cybercriminals fuel human trafficking on the internet. Discover the promising role of OSINT in unmasking these elusive criminals.
OSINT Featured Using OSINT to Combat Organ Trafficking Unravel the dark web of organ trafficking and discover the power of open-source intelligence (OSINT) in exposing this clandestine crime and advocating for global health justice.
OSINT Featured Leveraging Breach Data for OSINT Unearth the secrets of leveraging data breaches for OSINT investigations in this comprehensive cybersecurity article, packed with insights on real-world implications and essential strategies for staying vigilant in the constantly shifting digital landscape.
INFOSEC Communicate with AI to learn Malware analysis techniques V1.0 Discover the ultimate malware analysis guide! Follow our comprehensive roadmap, including book recommendations, video tutorials, and top tools, all backed by AI communication, to excel in the world of malware analysis and become a skilled malware analyst.