CYBERSEC Power Grid Vulnerabilities Smart grid technology presents an opportunity for threat actors seeking to disrupt the power grid.
TECHNICAL HTB Pandora Walkthrough A technical walkthrough of the HackTheBox Pandora challenge, by HTB Legend Andy From Italy.
TECHNICAL CVE-2022-24112 Exploiting HTTP Request Smuggling Header smuggling is the art of running commands on the target server by playing around with HTTP headers.
INFOSEC A Criminal Vulnerability Disclosure The story of German hacker Lilith Wittmann who ran into trouble with the law after finding a security vulnerability.
INFOSEC Application Security 101 A short guide to application security aimed at newcomers to the subject.
CYBERSEC Meet the Ransomware Gang Behind The Biggest Supply Chain Hacks A gang nicknamed Cl0p, FIN11, and TA505 has been hacking and extorting hundreds of companies for years.
TECHNICAL HTB Paper Walkthrough A technical walkthrough of the HackTheBox Paper challenge, by Andy From Italy.
CYBERSEC Why You Should Invest In Cybersecurity Startups A cybersecurity startup founder explains why you should invest in cybersecurity startups.
INFOSEC How To Market Your Cyber Startup One of the often-neglected sides of the tech industry is understanding how to market yourself and your product.
TECHNICAL HTB Unicode Walkthrough A technical walkthrough of the HackTheBox Unicode challenge, by Andy From Italy.
CYBERSEC Start Your Pentest In The Right Way To increase your chances of success and keep yourself out of trouble, hosting a kickoff meeting before starting a pen test is essential.
INFOSEC User Account Control Bypass For Windows 11 & Windows Server 2022 Security researcher Patrick Hoogeveen cracks open Windows UAC to bypass it for your viewing pleasure.
INFOSEC The Zero Trust Handbook (1) A high level introduction to the zero trust cybersecurity movement explained in layman’s terms.
TECHNICAL HTB Backdoor Walkthrough Andy From Italy is back with another solid HackTheBox technical write up, this time he heads for the BACKDOOR.
Breaking Reverse Proxy Parser Logic Security researcher Blake Jacobs teaches us how to break reverse proxy parser logic to redirect server traffic.
How Copy Pasting Can Get You Hacked Ctrl C + Ctrl V is an unsung hero to every programmer and sysadmin out there and an elementary and universal keyboard combination integrated into the core of every OS ecosystem. I have used
OSINT OSINT Bites 1 - Architecture Part 1 of Luca Ziesler’s OSINT Bites Collection focuses on architecture and the role it plays in geolocation.
TECHNICAL Funny Deadly Linux Strings Part 2 Security researcher Patrick Hoogeveen returns with part two of his series on deadly little Linux strings.
INFOSEC We Are All Hacktivists Now Our adversaries allow cybercrime groups to flourish within their borders, while we demonize our hacker communities.
TECHNICAL HTB Devzat Walkthrough A technical walk through of the HackTheBox DEVZAT challenge, by Andy From Italy.
TECHNICAL HTB Driver Walkthrough A technical walk through of the HackTheBox DRIVER challenge, by Andy From Italy.
INFOSEC The CIA Triad The CIA Triad may sound like an unholy alliance of the CIA and Chinese gangsters, but is actually good practice.
TECHNICAL Funny Deadly Linux Strings Security researcher x0xr00t Likes to play around with funny encoding strings that execute directly after decrypt.
INFOSEC Legality & The IT Army Of Ukraine Hundreds of thousands of infosec professionals signed up for cyberwar without realizing it might make them cyber combatants.
INFOSEC DeTy: A Website For The Missing People Of Ukraine De Ty? Де Ти? Where Are You? Volunteers from the infosec space built a website for the missing people of Ukraine.