Here's how to take back your #privacy
Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
Black Hat Europe took place last week - here's why Arsenal is a valuable component.
In recent weeks ransomware hysteria has been sweeping the press thanks to a fresh wave of high profile infections.
Your SQL Transaction Log is a file. That file contains records, as the name would suggest, of all SQL transactions that are made.
Here's our friendly list of very basic DOs and DON'Ts each year to help protect you and yours this holiday season. Please - check it twice!
Learn about the OSINT exploitation points on Gab, including tools and techniques to help you get the most out OSINT investigations on the platform.
Learn more about ransomware attack techniques and countermeasures with infosec author Nihad Hassan.
Learn about the history and origins of juice jacking, and what should be on your mind before you plug into an unknown USB port to charge your device.
Learn about DMARC and how it can prevent fraudulent or spoofed emails being sent from your domain. Includes full DMARC setup instructions!
One of the most obvious places to find evidence of increasing cybercrime are the fines levied on organizations who suffer data breaches and security incidents.
Google’s Chrome browser has become the most widely used browser on the market but is it a good fit your company and your security policies?
In this article I will show you how to build your own custom OSINT username search tool using a python script that I call SULTAN.
Until companies design products and services with security in mind the work of protecting our privacy and security falls on consumers.
Nobody else is taking the threat posed by alien red teams seriously, somebody has to and we decided that this duty falls upon us here at Secjuice.
Learn about the role open-source intelligence gathering techniques play in penetration testing operations.
Artificial Intelligence in Cybersecurity foreshadows a change in the nature of the cyber attacks that we defend against.
Learn how to run TikTok OSINT investigations in this how to guide from veteran OSINT Hunter Sinwindie.
Part two in Misinformation Researcher Sarah Thompson's series on coordinated inauthentic behavior on social media.
In this article I will be focusing on building a live infosec system lab the right way (my way). I will explain various firewalls, SIEMS, IDS/IPS, Web Proxies, Virtual Machines, Domain Controllers and vulnerability scanners.
A closer look at the 'coordinated inauthentic behavior' that bot networks engage in across social media.
While investigating Ease of Access options in Windows 10 I managed to find a new persistence technique.