TECHNICAL HTB MetaTwo Walkthrough A simple box with a user flag is slightly more intricate than the root flag, yet it still challenges the patience and resilience of a penetration tester.
crypto Why You Need A Crypto LLC A crypto LLC is a must have for any serious trader, it provides legal protection, operational efficiency, and financial advantages that can be pivotal for long-term success.
cryptocurrency Cryptocurrency & Blockchain Technology Regulations The asset class has yet to be declared by the regulators and this is where the currency vs security debate begins.
TECHNICAL Featured Infostealers: An Overview We’ll dive into the sneaky world of infostealers, malware that steals your secrets like a ninja!
INFOSEC The CMMC Countdown, Part 4 This high-level review of the five-point controls required for a conditional certificate will wrap up the CMMC action plan.
TECHNICAL HTB Socket Walkthrough Learn how a vulnerability in a WebSocket application was discovered and exploited using SQL injection.
OSINT Featured Using Newly Surfaced Data Breaches for OSINT Research Data Breach Search Engines (DBSEs) collect and organize leaked information from data breaches, enabling OSINT investigators to access it.
INFOSEC The CMMC Countdown: The Action Plan, Part 3 Continue your CMMC action plan with this high-level review of the five-point controls required to get a conditional certificate.
TECHNICAL HTB Precious Walkthrough Learn how to hack the box with this simple, vulnerable box. A simple nmap scan reveals a web page converter with a vulnerability in the pdfkit tool.
TECHNICAL HTB Soccer Walkthrough Learn how to break into a soccer portal using vulnerabilities in the Tiny File Manager hidden route.
TECHNICAL HTB MonitorsTwo Walkthrough Learn how to exploit a vulnerable Catci instance in this hack the box post.
INFOSEC Featured SecjuiceCON 2025 Come and host a talk at SecjuiceCON, our very first virtual conference! Submit your speaker presentation abstract by December 31, 2024.
INFOSEC The CMMC Countdown: The Action Plan, Part 2 Start your CMMC action plan with this high-level review of the five-point controls required to get a conditional certificate.
MALWARE Understanding the Black Basta Ransomware Service Learn how Black Basta’s double extortion tactics works.
TECHNICAL Age Verification: An Analysis of its Effectiveness & Risks Age verification laws have been suddenly rolling out in the USA. In this article, we will navigate through a complex analysis, as I seek to stimulate your thoughts rather than impose conclusions. Today's discussion centers on age verification protocols implemented on pornography websites.
OSINT Political Donations - OSINT Explore tools like FEC, Open Secrets, and state databases to research individual political donations and donor details easily.
TECHNICAL HTB Pilgrimage Walkthrough Search for flags using tools like nmap and ImageMagick, identify vulnerabilities, exploit them, find user credentials, and capture flags. Happy hacking the box!
cryptocurrency What Does A Cryptocurrency B2B Scam Look Like? With the arrival of new technologies, cryptocurrency scams are catching a second wind. Take a closer look at the scams targetting businesses.
HTB Jupiter Walkthrough Discover how temporary files can provide information for getting access to a Jupyter notebook.
HTB Ambassador Walkthrough Discover how using an access token can allow breaking into a development server.
OSINT Ethereum Reboots Crypto Investigation The smart blockchain created a crypto ecosystem of NFTs, DeFi, and Dapps, along with new kinds of investigations.
cryptocurrency Cryptology : The Original Crypto Cryptology is the art and science that deals with both cryptography and cryptanalysis, lets dive into its two main components.