INFOSEC Secjuice Squeeze 50 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
INFOSEC How to Tell if a Website is Dangerous Learn how to use different tools to determine whether a site is dangerous.
TECHNICAL How to Use APIs (explained from scratch) Learn how to use APIs with Python with no prior knowledge of either.
CYBERSEC Using Many Email Addresses to Reduce Your Cybersecurity Risk Using different email addresses as a cybersecurity strategy can reduce our risk. But make sure to follow good security hygiene.
INFOSEC Secjuice Squeeze Volume 49 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
OSINT OSINT & The Intelligence Cycle Part Five: Dissemination Legend intelligence analyst Sinwindie returns with Part Five in his series on the OSINT Intelligence Cycle.
OSINT OSINT - Scraping Deep Web Databases with Python Learn how to scrape deep web databases with Python for OSINT investigations.
INFOSEC Secjuice Squeeze Volume 48 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
OSINT OSINT Guide To Bitcoin Investigations Bitcoin offers a unique opportunity for financial investigation in that an amateur can easily research a given person’s bitcoin usage.
INFOSEC A Homage To DNS Since IT'S ALWAYS DNS, I thought I might as well do a little article about all the funny stuff you can do with DNS.
INFOSEC How To Manage Vulnerabilities Vulnerability management is the practice of finding, indexing, analyzing, and remediating weakness in systems to improve their security.
INFOSEC Secjuice Squeeze Volume 47 Welcome to the Secjuice Squeeze, a curated selection of security articles and infosec news that you may have missed.
INFOSEC Secjuice Squeeze Special Edition: Top Hacks of 2020 In this Secjuice Squeeze special edition, we review the top hacks of 2020, because looking back this year was a strong year for the bad guys.
OSINT OSINT: Automate Face Comparison With Python and Face++ Learn how to automate the task of face comparison during OSINT investigations with Python and Face++.
INFOSEC How & Why You Should Remove Yourself From Windows Local Admin Members of the admin club are allowed to do anything on a system, but you do not need to wield these godly powers for everyday browsing.
INFOSEC Six Podcasts You Should Listen To There's always something going on with cybersecurity and the best way to stay up to date is with a good podcast.
OSINT OSINT: How To Research & Investigate U.S. Phone Numbers U.S. phone numbers are unique, compared to other countries, because of the publicly available information affiliated with their registered owners.
INFOSEC Essentialism Applied To Infosec What would your life be like if all you had was the bare minimum of stuff you need to survive and keep yourself physically and mentally healthy?
INFOSEC Make WordPress Pingback Great Again DoS Amplification and CDN/Load Balancer/WAF bypass. This article aims to show you how a number of ways you can collect WordPress pingback.
OSINT On The OSINT Trail of Palmali Shipping Seafarer abandonment is a horrible labor-rights abuse where companies cut loose ships with their crews aboard, often leaving them in dire conditions.
INFOSEC Netflix Security Tools: Chaos Monkey and Chaos Gorilla Netflix has a security tool that changed the way businesses test for resilience called chaos monkey and it's successor chaos gorilla.