TECHNICAL HTB Cap Challenge Walkthrough In this article, Gurkirat Singh gives us a technical walkthrough of the HackTheBox Cap challenge!
TECHNICAL A Python Regular Expression Bypass Technique Sometimes, functions included in Python RE are misused by developers and when you see this it can be possible to bypass weak input validation functions.
INFOSEC Secjuice Squeeze 73 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL HTB Armageddon Walkthrough A technical walk-through of the HackTheBox Armageddon challenge.
INFOSEC ID Verification is Not The Solution for Online Hate Speech It's been two years since the UK government's (failed) plan to introduce ID verification and they have decided they want to give it another go.
INFOSEC Secjuice Squeeze 72 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL VulnHub VulnOS2 Walkthrough A comprehensive technical walkthrough of the VulnHub VulnOS2 challenge.
TECHNICAL HTB Breadcrumbs Walkthrough A technical walk-through of the HackTheBox Breadcrumbs challenge.
Can Infosec Professionals Be Vulnerable To Phishing? Miguel Calles, created polls on social networks to learn whether people believe security engineers could be phished.
INFOSEC Secjuice Squeeze 71 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
INFOSEC Secjuice Squeeze 70 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL Attack Defense: Windows Basic Exploitation #9 Learn how to exploit the NodeJS debug server and gain a foothold on the target system.
INFOSEC Secjuice Squeeze 69 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
HTB Spectra Walkthrough Welcome back to another hack the box walkthrough. This week we are looking at Spectra.
INFOSEC Secjuice Squeeze 68 Welcome to the Secjuice Squeeze, a weekly, curated selection of interesting security articles and infosec news that you may have missed.
INFOSEC Featured Secjuice Squeeze 67 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
Securing APIs on Mobile Apps Can Prevent Data Breaches Many users of mobile apps have no idea what an API is and why it is important. Unless you are a programmer and/or work in information security, chances are you don't even have the slightest clue about what I'm talking about. Is it a gang name?
Featured Blue Team Detection: DarkSide Ransomware Malware write-ups can be found in abundance online, they are often written from the point of view of a malware researcher who focuses on the deep internals of how malicious software works.
Summary of the worlds largest supercomputer. Folding@Home is essentially the worlds largest supercomputer, but its no ordinary super computer.
INFOSEC Secjuice Squeeze 66 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed.