OSINT Build An OSINT Username Search Tool Using SULTAN In this article I will show you how to build your own custom OSINT username search tool using a python script that I call SULTAN.
JavaScript Malware Targeting WordPress Infosec researcher Andrea Menin returns with a technical breakdown of Javascript malware targeting Wordpress installs.
INFOSEC Better Privacy: Encrypting DNS Until companies design products and services with security in mind the work of protecting our privacy and security falls on consumers.
CYBERSEC The UFO/Alien Cyber Threat Nobody else is taking the threat posed by alien red teams seriously, somebody has to and we decided that this duty falls upon us here at Secjuice.
OSINT OSINT In Penetration Testing Learn about the role open-source intelligence gathering techniques play in penetration testing operations.
CYBERSEC Enter the Dragon: AI + Cybersecurity Artificial Intelligence in Cybersecurity foreshadows a change in the nature of the cyber attacks that we defend against.
OSINT OSINT Investigations on TikTok Learn how to run TikTok OSINT investigations in this how to guide from veteran OSINT Hunter Sinwindie.
INFOSEC The Coordinated Inauthentic Behavior of TheBL network on Facebook Part two in Misinformation Researcher Sarah Thompson's series on coordinated inauthentic behavior on social media.
INFOSEC Coordinated Inauthentic Behavior A closer look at the 'coordinated inauthentic behavior' that bot networks engage in across social media.
TECHNICAL Abusing Windows 10 Narrator 'Feedback-Hub' for Fileless Persistence While investigating Ease of Access options in Windows 10 I managed to find a new persistence technique.
INFOSEC Etag Tracking 101 An introduction to Entity Tags and how they are used to track internet users as they browse the internet.
OSINT Reddit OSINT Techniques Reddit is one of the few social media platforms that have a robust set of third-party tools for OSINT investigations.
INFOSEC Not Your Grandpa's Keyboard Why do so many of us waste our lives using keyboards with no personality?
INFOSEC Pentest Gone Bad: The Iowa Incident What happens when penetration testers get caught? To some people banning penetration tests seems like a good idea.
INFOSEC How to Write Cybersecurity Use Cases Learn how to write Use Cases in an engaging, immersive, and empathetic manner to generate sales leads and help build lasting relationships with buyers.
TECHNICAL OSINT Basics: Detecting and Enumerating Firewalls & Gateways The following article will deal with basics and teach you how to detect and enumerate firewalls and gateways.
CYBERSEC Vendors Need to Stop Fear-Mongering Less fear and better information from vendors will help potential buyers make rational, informed purchasing decisions.
INFOSEC Chrome Extensions: The Dark Cloud Chrome extensions are leaking your data and the cloud is raining.
INFOSEC Mystical Mathematics & Snake Oil An opinion piece which takes a closer look at the TimeAI / Crown Sterling story.
CYBERSEC A Visit To SecTor 2019 This year I went to the SecTor conference in Toronto, Canada for the first time and I had a wonderful experience.
TECHNICAL Reply CTF Write-Up This years Reply Cybersecurity Challenge was a 'CTF Edition' with some great prizes up for grabs so I got involved!
UNUSUAL JOURNEYS INTO INFOSEC Unusual Journeys Into Infosec Featuring Psychtosec In this episode of Unusual Journeys Into Infosec we analyse the human psychology of infosec and the choices we make.
INFOSEC Get Ready For BEER CON ONE #BC1 The closest infosec will ever get to a live telethon will be at BeerCon One when the Beer Farmers hold their podcast charity event.
INFOSEC GDPR Fines Have Reach & Bite Now that GDPR has been in effect for over a year, let's take a closer look at the fines imposed on those who failed to comply.
INFOSEC Write Like a Pro, Not Like a Bro Well-researched cybersecurity pieces that are easy to read and a joy to understand require a great deal of care and attention to create.