INFOSEC What's It Like To Be An Infosec Mentor? Learn what it's like to be an infosec mentor and the kind of help people need when they look for a mentor.
INFOSEC Squeeze Volume 5 - Christmas Trojans, Bluetooth Car Break-Ins & More! Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
OSINT Defend Against SIM Swapping SIM swapping attacks are on the rise, learn more about them and how to protect yourself against them.
INFOSEC Featured Write Your Passwords in a Notebook and How To Memorialize and Access Deceased Loved Ones' Online Accounts These aren't easy things to think about but they are important. Here's everything you need to know in one place.
INFOSEC Squeeze Volume 4 - Retailers Are Easy Targets, Crime is Up 20% in the U.S., and Yet Another Reminder to UPDATE YOUR SCHWACK Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
INFOSEC Squeeze Volume 3 - $5M Bounty, Great Cannon DDoS, Linux CVE, a BeerCon in a pear tree Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
CYBERSEC Arsenal, The Essence of Black Hat Black Hat Europe took place last week - here's why Arsenal is a valuable component.
CYBERSEC Simple Protection Against Ransomware (Ryuk) In recent weeks ransomware hysteria has been sweeping the press thanks to a fresh wave of high profile infections.
TECHNICAL How To Avoid A Full SQL Server Transaction Log Your SQL Transaction Log is a file. That file contains records, as the name would suggest, of all SQL transactions that are made.
INFOSEC Squeeze Volume 2 - Twitter Hacker Arrested & New MFA, Google Hacking, New Kali Feature & More Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
INFOSEC Featured ♪♫♬ It’s Beginning to Look A Lot Like Riskmas ♪♫♬ Here's our friendly list of very basic DOs and DON'Ts each year to help protect you and yours this holiday season. Please - check it twice!
OSINT Gab OSINT Techniques Learn about the OSINT exploitation points on Gab, including tools and techniques to help you get the most out OSINT investigations on the platform.
TECHNICAL Ransomware: Attack Techniques and Countermeasures Learn more about ransomware attack techniques and countermeasures with infosec author Nihad Hassan.
INFOSEC Squeeze Volume 1 - Disney+, Google $1.5M Reward & More Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
INFOSEC A Short History of Juice Jacking Learn about the history and origins of juice jacking, and what should be on your mind before you plug into an unknown USB port to charge your device.
TECHNICAL Featured A Definitive Guide To DMARC Learn about DMARC and how it can prevent fraudulent or spoofed emails being sent from your domain. Includes full DMARC setup instructions!
CYBERSEC Security & Data Breach Fines One of the most obvious places to find evidence of increasing cybercrime are the fines levied on organizations who suffer data breaches and security incidents.
INFOSEC Chrome From A Security Perspective Google’s Chrome browser has become the most widely used browser on the market but is it a good fit your company and your security policies?
OSINT Build An OSINT Username Search Tool Using SULTAN In this article I will show you how to build your own custom OSINT username search tool using a python script that I call SULTAN.
JavaScript Malware Targeting WordPress Infosec researcher Andrea Menin returns with a technical breakdown of Javascript malware targeting Wordpress installs.
INFOSEC Better Privacy: Encrypting DNS Until companies design products and services with security in mind the work of protecting our privacy and security falls on consumers.
CYBERSEC The UFO/Alien Cyber Threat Nobody else is taking the threat posed by alien red teams seriously, somebody has to and we decided that this duty falls upon us here at Secjuice.
OSINT OSINT In Penetration Testing Learn about the role open-source intelligence gathering techniques play in penetration testing operations.
CYBERSEC Enter the Dragon: AI + Cybersecurity Artificial Intelligence in Cybersecurity foreshadows a change in the nature of the cyber attacks that we defend against.