OSINT Conflict of Interest: How to Research Corporate Lobbying & Lobbyists A lot of the activity between corporations and politicians is publicly documented but it remains hidden because so few people know where to look.
OSINT Top 6 Personality Traits for Successful Investigators Anyone who works in the field of investigations for long enough learns to develop certain character traits and cognitive characteristics.
INFOSEC Hacking Is NOT A Crime! (Part 1) Mars Groves spoke to the founding team over at HINAC to find out about their mission and what makes them tick.
INFOSEC Secjuice Squeeze 74 Welcome to the Secjuice Squeeze, a lovingly curated selection of interesting security articles and infosec news that you may have missed.
Attack Defense: Windows Basic Exploitation #10 Apache Tika is a toolkit that detects and extracts metadata and text from over a thousand different file types.
TECHNICAL HTB Cap Challenge Walkthrough In this article, Gurkirat Singh gives us a technical walkthrough of the HackTheBox Cap challenge!
TECHNICAL A Python Regular Expression Bypass Technique Sometimes, functions included in Python RE are misused by developers and when you see this it can be possible to bypass weak input validation functions.
INFOSEC Secjuice Squeeze 73 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL HTB Armageddon Walkthrough A technical walk-through of the HackTheBox Armageddon challenge.
INFOSEC ID Verification is Not The Solution for Online Hate Speech It's been two years since the UK government's (failed) plan to introduce ID verification and they have decided they want to give it another go.
INFOSEC Secjuice Squeeze 72 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL VulnHub VulnOS2 Walkthrough A comprehensive technical walkthrough of the VulnHub VulnOS2 challenge.
TECHNICAL HTB Breadcrumbs Walkthrough A technical walk-through of the HackTheBox Breadcrumbs challenge.
Can Infosec Professionals Be Vulnerable To Phishing? Miguel Calles, created polls on social networks to learn whether people believe security engineers could be phished.
INFOSEC Secjuice Squeeze 71 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
INFOSEC Secjuice Squeeze 70 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL Attack Defense: Windows Basic Exploitation #9 Learn how to exploit the NodeJS debug server and gain a foothold on the target system.
INFOSEC Secjuice Squeeze 69 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
HTB Spectra Walkthrough Welcome back to another hack the box walkthrough. This week we are looking at Spectra.
INFOSEC Secjuice Squeeze 68 Welcome to the Secjuice Squeeze, a weekly, curated selection of interesting security articles and infosec news that you may have missed.