CYBERSEC US Election Cybersecurity Increased As Cyber Threats Remain Strong Malicious actors have attempted to undermine the nation’s democracy and cyber threats in the form of disruption and misinformation remain strong.
CYBERSEC Leveraging the OSI Model to Prevent Cybersecurity Attacks Learn how addressing weaknesses in the physical, network, application, and human layers help prevent cybersecurity attacks.
CYBERSEC Why I Wrote A Serverless Security Book Learn why cybersecurity writer, Miguel Calles decided to write the first-ever book on serverless security.
CYBERSEC Autonomous Vehicle Cybersecurity Self driving cars are one of the most heavily anticipated innovations of the 21st century, but the potential cybersecurity risks cannot be ignored.
CYBERSEC AWS CDK vs Serverless Framework Let's compare Serverless Framework and AWS CDK for framework ease of use, extensibility, and security.
CYBERSEC Spyse Geek Out In this article I am going to geek out over Spyse, a new cybersecurity search engine I have started using.
CYBERSEC Cybersecurity Advice From The UK’s National Cyber Security Centre We spoke to the former head of the UK’s National Cyber Security Centre to get some good advice for businesses.
CYBERSEC The Geopolitics of Covert Cyber Warfare Cyber warfare is a whole different ball game and many will be unaware but the world is being ushered into a new era of covert warfare.
CYBERSEC Beginners Cybersecurity (4) - Intrusion Welcome to my cybersecurity guide for beginners, this article focuses on the reason that everyone wants to be a hacker, intrusion.
CYBERSEC Zoom Privacy and Security Woes A short article on Zoom'z recent security and privacy woes, written from the perspective of a hacker.
INFOSEC Windows Forensics: Artifacts (1) The first article in our series on Windows Forensics from security researcher Hartoyo Wahyu, in this episode he covers artifacts.
CYBERSEC Deep Learning & Cybersecurity: Part 2 The intersection of deep learning and cybersecurity, featuring two famous cyber attacks and their machine learning applications.
CYBERSEC You Can Run, But Can You Hide? A true crime story about tracking fugitives, written by a veteran OSINT hunter and former policeman.
CYBERSEC Deep learning & Cybersecurity (1) How Machine learning, Deep learning, and Artificial intelligence algorithms can intersect with cybersecurity
CYBERSEC Zoom Fiesta An in-depth look at the recent security issues at Zoom, from security researcher Thunderson.
CYBERSEC The Intersection Of SARS-CoV-2 And The Cybersecurity World Armchair epidemiologists have sprung up all over social media, so can cybersecurity researchers also have an informed opinion? I think so!
CYBERSEC Remote Working Cybersecurity A closer look at some of the issues faced by cybersecurity teams grappling with the sudden exodus of workers from the office into their homes.
CYBERSEC Secjuice Hall Of Fame The Secjuice Hall Of Fame, where we immortalize legendary Secjuice members, volunteers who made a difference and writers who contribute to our project.
TECHNICAL ModSecurity Denial of Service Details and PoC CVE-2019-19886 Security researcher Andrea Menin tells us the story of vulnerabilities he found in libModSecurity.
TECHNICAL Apple iCloud Credential Stealing Better phishing with CVE-2020-3841 from security researcher Sebastian Bicchi and his red team exercise.
INFOSEC Infosec Writers Challenge Welcome to the Triple Ten, an infosec writers challenge open to anyone who likes to write about cyber or information security.
CYBERSEC Featured The Cybersecurity Skill Shortage Goes Beyond a Government Responsibility The cybersecurity is facing a skill shortage. Learn why it matters and the efforts underway to address it.
INFOSEC The Hulk Was My Best Friend As A Kid: Advice on Answering Security Questions Think twice before giving truthful answers to your security questions for online banking and services. The answers can sometimes be easy to find online.
CYBERSEC Arsenal, The Essence of Black Hat Black Hat Europe took place last week - here's why Arsenal is a valuable component.