TECHNICAL Featured Bypassing Web Application Firewalls for Cross-Site-Scripting Web Application Firewalls can make your life much harder when using automated tools. But you can bypass a lot of firewalls when exploiting XSS vulnerabilities by analyzing them manually.
CYBERSEC India - A Hackers Perspective Lets take a closer look at India and what normal people there think about hackers, with security researcher Rohan Chavan.
CYBERSEC The Six Lessons That I Learned Landing My First Cybersecurity Job Learn how Janice Dyer managed to land her first job in cybersecurity and the six valuable lessons that she learned along the way.
TECHNICAL Writing A Simple Directory Bruteforcing Tool with 25 Lines of Python Security researcher Rohan Chavan got bored one day and wrote a simple directory brute force tool using just 25 lines of Python.
CYBERSEC My First Swag Pack : A Logical Bug on Edmodo A very short story about the first swag pack that security researcher Abartan Dhakal ever won, when he found a logical bug at Edmodo.
The Semi-Attached Figure: How To Spot Manipulative Security Advertising Claims Marketing claims and proof for the claim are often unrelated. Don’t fall for it! A guide to manipulative security advertising with Tony Martin-Vegue.
CYBERSEC Rise Of The HTTPS Bullies It all started with Google unilaterally deciding to call most of the internet UNSAFE because they did not have an SSL certificate installed, this is what led to the rise of the HTTPS bullies.
INFOSEC My Journey To The OSCP Exam The journey to completing the OSCP exam can be a long one, learn about the trials and tribulations of security analyst Lee Wangenheim as he prepared to take his OSCP exam.
CYBERSEC Tips From A Bugbounty Hunter Some great success tips in this short beginners guide to bug hunting, from infosec researcher Abartan Dhakal
INFOSEC Developing a Leadership Team that Embraces Cybersecurity Awareness Learn how to develop a leadership team which embraces cybersecurity awareness with infosec CEO Jon Santavy.
CYBERSEC Why Has Remote Browser Isolation Not Been More Widely Adopted? Remote browser isolation is clearly the future of endpoint cybersecurity, but why has the model not been more widely adopted?
CYBERSEC How I Stole Your Username & Password In Five Minutes Using WiFiPhisher. Security researcher Riccardo Landolfo explains how easy it is for a hacker to phish your usernames and passwords over a public WIFI network.
CYBERSEC Why You Should Include Cyber Requirements In The Development Cycle Including cyber requirements in your dev cycle can pay dividends over the long term argues security writer Miguel Calles.
INFOSEC The Mad Men of Security Advertising Learn how the framing effect is used to subtly change reader perceptions in security advertising, with security strategist Tony Martin-Vegue.
INFOSEC Asset Discovery In A Complex Enterprise Maintaining an inventory of assets is a challenge. This article looks at ways to identify the full breadth of your organizations internet-facing estate.
CYBERSEC Cloudy With A Chance Of Downfall - A Look At Cloud Access Security Brokers Cloud based applications bring with them a number of new risks. Is your security strategy taking them into account?
INFOSEC Red Notice Blizzard Warning: Secure Communications & Willful Ignorance Sitting in front of a criminal or extremist and explaining the benefits of risk mitigation is not wise if your best defense is that encryption is a human right.
CYBERSEC Featured Create a Digital Fortress With a Private Search Engine and a VPN Learn how to create a 'digital fortress' to maintain your online privacy using a search engine and a VPN with security researcher Christian Stewart.
CYBERSEC From Farming To Cybersecurity Inspired by the Unusual Journeys Into Infosec series, security researcher Janice Dyer tells us how farming and cybersecurity are similar in lots of ways.
CYBERSEC The Silk Road Case: #FreeRoss Ulbricht Ross Ulbricht is the founder of the original Silk Road website. After the FBI shut down the website, Ross has been arrested and sentenced with a double life in prison without parole in a maximum-security prison. This is wrong and I'll show you why.
INFOSEC Asset Discovery In A Complex Enterprise Maintaining an inventory of assets is a challenge. This article looks at ways to identify the full breadth of your organizations internet-facing estate.
CYBERSEC Cloudy With A Chance Of Downfall - A Look At Cloud Access Security Brokers Cloud based applications bring with them a number of new risks. Is your security strategy taking them into account?
INFOSEC Red Notice Blizzard Warning: Secure Communications & Willful Ignorance Sitting in front of a criminal or extremist and explaining the benefits of risk mitigation is not wise if your best defense is that encryption is a human right.
CYBERSEC Featured Create a Digital Fortress With a Private Search Engine and a VPN Learn how to create a 'digital fortress' to maintain your online privacy using a search engine and a VPN with security researcher Christian Stewart.
CYBERSEC From Farming To Cybersecurity Inspired by the Unusual Journeys Into Infosec series, security researcher Janice Dyer tells us how farming and cybersecurity are similar in lots of ways.