CYBERSEC How To Setup Miners For Monero (XMR) Learn how to securely set up and operate a Monero miner, to mitigate against cyber theft with Alessanco Innocenzi.
OSINT OSINT Is A State Of Mind OSINT is a state of mind argues master OSINT practitioner Dutch OSINT Guy and true ‘OSINTians’ are members of a small group who go public on their skills, knowledge and findings.
CYBERSEC Kali Linux vs Parrot - Whats Different? In this article Rohan Chavan tells us the ten reasons why he prefers Parrot and gives us the key differences between Kali Linux and Parrot Sec.
OSINT OSINT Isn’t Evidence - InfoSec Needs To Take A Step Back & Breathe OSINT isn't evidence argues cybersecurity author Jeffrey Carr and the infosec space needs to take a step back when it comes to thinking of OSINT in that way.
OSINT An OSINT Script For Scanning Multiple Organizations Using Shodan and Golang Security researcher Wojciech created a great OSINT script to scan multiple organizations using Shodan & Golang.
OSINT The Daily Dose Of Malware OSINT Script For Hunting Fresh Malware Samples Security researcher Wojciech created a brilliant OSINT script to help him harvest fresh malware samples that he calls the 'Daily Dose Of Malware'.
Controlling Dwell Time Is About Much More Than Compliance Breach detection and controlling dwell time is about much more than compliance argues Robert MacMillan.
INFOSEC The 100 Million Dollar Infosec Question If someone gave you 100 million dollars to improve information security, how would you spend it asks Dan Klinedinst in this infosec thought experiment.
CYBERSEC A Closer Look At The Hacker Known As AKILL Remember Owen Walker? Well Gabriel Duarte does and in this article gives us the lowdown on the hacker known as AKILL.
INFOSEC Privacy And The Trail You Leave Behind In a world where everyone is over exposed in the context of privacy the, coolest thing you can do is maintain your mystery argues Shivam Singh Sengar.
INFOSEC Compliance Is Who You Are Not What You Do In this article Bryan Brannigan explains why compliance is something that you are and not something that you do, an interesting perspective on compliance.
CYBERSEC An XSS Road Trip (Journey Through The Web #1) Join us on a journey through the web, and an XSS roadtrip with Paul Dannewitz who gives us some good examples of XSS vulnerabilities that he found in the wild.
CYBERSEC My First Foray Into Software Reverse Engineering Security researcher Alessandro Innocenzi is dipping his toe into reverse engineering, join him on his journey and find our what he learned.
Come And Write With Us Secjuice provides a platform for those with a story to tell, knowledge to share, or an experience that we can all learn from. Come and join our team!
What Is Secjuice? Secjuice is a volunteer led collective of 100+ writers focused on cybersecurity, information security, network security and open source intelligence.
Hire An Infosec Writer Secjuice is a seventy strong group of infosec and cybersec writers, some of whom are available to write for you on a freelance basis.