Secjuice

NON-PROFIT CYBER GOODNESS

  • Technical
  • OSINT
  • Unusual Journeys
  • HoF
  • Write With Us
  • Hire A Writer
  • About Us
  • Rankings
CYBERSEC

Why You Should Invest In Cybersecurity Startups

A cybersecurity startup founder explains why you should invest in cybersecurity startups.

  • Guise Bule
    Guise Bule
6 min read
INFOSEC

How To Market Your Cyber Startup

One of the often-neglected sides of the tech industry is understanding how to market yourself and your product.

  • Shimon Brathwaite
    Shimon Brathwaite
3 min read
TECHNICAL

HTB Unicode Walkthrough

A technical walkthrough of the HackTheBox Unicode challenge, by Andy From Italy.

  • Andy74
    Andy74
23 min read
CYBERSEC

Start Your Pentest In The Right Way

To increase your chances of success and keep yourself out of trouble, hosting a kickoff meeting before starting a pen test is essential.

  • Manh Pham
    Manh Pham
4 min read
INFOSEC

User Account Control Bypass For Windows 11 & Windows Server 2022

Security researcher Patrick Hoogeveen cracks open Windows UAC to bypass it for your viewing pleasure.

  • x0xr00t
    x0xr00t
5 min read
INFOSEC

The Zero Trust Handbook (1)

A high level introduction to the zero trust cybersecurity movement explained in layman’s terms.

  • Guise Bule
    Guise Bule
6 min read
TECHNICAL

HTB Backdoor Walkthrough

Andy From Italy is back with another solid HackTheBox technical write up, this time he heads for the BACKDOOR.

  • Andy74
    Andy74
21 min read

Breaking Reverse Proxy Parser Logic

Security researcher Blake Jacobs teaches us how to break reverse proxy parser logic to redirect server traffic.

  • Blake Jacobs
    Blake Jacobs
6 min read

How Copy Pasting Can Get You Hacked

Ctrl C + Ctrl V is an unsung hero to every programmer and sysadmin out there and an elementary and universal keyboard combination integrated into the core of every OS ecosystem. I have used

  • Debarshi Das
    Debarshi Das
2 min read
OSINT

OSINT Bites 1 - Architecture

Part 1 of Luca Ziesler’s OSINT Bites Collection focuses on architecture and the role it plays in geolocation.

  • Lucia Ziesler
    Lucia Ziesler
3 min read
TECHNICAL

Funny Deadly Linux Strings Part 2

Security researcher Patrick Hoogeveen returns with part two of his series on deadly little Linux strings.

  • x0xr00t
    x0xr00t
3 min read
INFOSEC

We Are All Hacktivists Now

Our adversaries allow cybercrime groups to flourish within their borders, while we demonize our hacker communities.

  • Guise Bule
    Guise Bule
4 min read
TECHNICAL

HTB Devzat Walkthrough

A technical walk through of the HackTheBox DEVZAT challenge, by Andy From Italy.

  • Andy74
    Andy74
32 min read
TECHNICAL

HTB Driver Walkthrough

A technical walk through of the HackTheBox DRIVER challenge, by Andy From Italy.

  • Andy74
    Andy74
23 min read
INFOSEC

The CIA Triad

The CIA Triad may sound like an unholy alliance of the CIA and Chinese gangsters, but is actually good practice.

  • Alesanco
    Alesanco
12 min read
TECHNICAL

Funny Deadly Linux Strings

Security researcher x0xr00t Likes to play around with funny encoding strings that execute directly after decrypt.

  • x0xr00t
    x0xr00t
2 min read
INFOSEC

Legality & The IT Army Of Ukraine

Hundreds of thousands of infosec professionals signed up for cyberwar without realizing it might make them cyber combatants.

  • Guise Bule
    Guise Bule
6 min read
INFOSEC

DeTy: A Website For The Missing People Of Ukraine

De Ty? Де Ти? Where Are You? Volunteers from the infosec space built a website for the missing people of Ukraine.

  • Guise Bule
    Guise Bule
3 min read
CYBERSEC

Advice for Ukrainians

Cyber warfare is not to be taken lightly especially for the Ukrainians! A good samaritan security researcher gives valuable advice to the Ukranian people on how they can stay safe on the internet!

  • Lucia Ziesler
    Lucia Ziesler
8 min read
INFOSEC

Secjuice Squeeze 77

Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.

  • Mars Groves
    Mars Groves
  • Andy74
    Andy74
  • Ross Moore
    Ross Moore
  • Prasanna
    Prasanna
6 min read
TECHNICAL

HTB Horizontall Walkthrough

Another Hack The Box walkthrough, but this time Andy From Italy explains how we can exploit the Horizontall machine with Laravel and remote code execution!

  • Andy74
    Andy74
20 min read
INFOSEC

Security Should Start with the Involvement of Top Management

Security researcher Alesanco explains why top management in an organization plays an important role in security, and how an organization can secure its assets by assessing risks and having a Business Continuity Plan (BCP) in place... and much much more.

  • Alesanco
    Alesanco
9 min read
INFOSEC

Log4Shell Explained to Your Non-Technical Friend

Security researcher Andrea Barracu explains how the Log4Shell vulnerability works in a digestible manner for those who are non-technical and still want to grasp an understanding of it.

  • Andrea Barracu
    Andrea Barracu
4 min read
INFOSEC

Threat Intelligence: Intelligence Requirement

Intelligence requirement (IR) is an important component of threat intelligence. Some of us don't know what it is or how to do IR. Find out what questions to ask to help you perform IR as told by Luca Ziesler.

  • Lucia Ziesler
    Lucia Ziesler
2 min read
INFOSEC

Secjuice Squeeze 76

Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.

  • Bhumish Gajjar
    Bhumish Gajjar
  • Andy74
    Andy74
5 min read
Secjuice © 2022
Linkedin Facebook Twitter Remote Browser Isolation