CYBERSEC The 'Cyber Defense For SMBs' Program The Cyber Defense For SMB's program is an initiative from the Florida Center For Cybersecurity to help small businesses improve their cybersecurity posture.
INFOSEC An OWASP AppSec California Conference Review (2019) A review of the the OWASP AppSec California 2019 conference with notes from infosec writer Miguel Calles.
TECHNICAL Uncover Infected Website Visitors Using Content Security Policies Security researcher Andrea Menin discovered that thousands of his website visitors were infected by using a content security policy.
CYBERSEC TryHackMe - A New Platform For Teaching And Learning Cybersecurity TryHackMe is a new platform for learning about and teaching cybersecurity, covering everything from the deeply technical to social engineering.
CYBERSEC Remote Browsers For The Many And Not Just The Few Who Can Afford Them In a cybersecurity market where most remote browser solutions are too expensive for the small businesses to consider, it can be tough to find an affordable remote browser solution.
INFOSEC Covert Comms: GDB Satellite Pager Looking for the ultimate in covert communication devices? Look no further, this satellite pager has you covered if you can afford it.
TECHNICAL Insecure Direct Object Reference (IDOR) A short guide to Insecure Direct Object Reference (IDOR), how to defend against it and how to exploit it, from security researcher Abartan Dhakal.
CTF The Matrix Write Up I had a great time with this box and it is with great pleasure I present my definitive Matrix write up covering one of my favorite Vulnhub boxes.
TECHNICAL Building A Red Team WiFi Attack Car Why drive a normal car when you can drive a red team WiFi attack car? Join security researcher Sebastian Bicchi to build the ultimate wardriving vehicle.
CYBERSEC The Future Of Artificial Intelligence Based Cyber Training There are exciting times ahead for AI fans in the cybersecurity industry and the brightest use case by far is the fusion of artificial intelligence and cyber training.
CTF The Zico 2 Write Up Another excellent write up from security researcher Thunder Son who covers Vulnhub's Zico 2 machine and jumps right into a technical deep dive.
CYBERSEC Defending Against SQL Injection Attacks In this article cybersecurity student Ozan Agdepe gives us some pro tips for defending against SQL injection.
CYBERSEC The 2018 SANS Holiday Hack Challenge A wonderfully comprehensive write up of the SANS 2018 Holiday Hack Challenge from security researcher Roy Shoemake.
TECHNICAL Penetration Testing Scanning 101.3 In part three of his series on penetration testing security researcher Hozaifa Owaisi covers port scanning and the tools used to get the job done.
CTF Vulnhub: Raven 2 Write Up In his latest write up security researcher Thunder Son covers Vulnhub's Raven 2 and deep dives into the challenge.
CYBERSEC How To Deal With A Hacker Finding Holes In Your Security Has a security researcher contacted you to tell you about a security vulnerability? Don't panic! Follow this common sense guide to dealing with hackers who find holes in your security.
TECHNICAL The LazySysAdmin Write-Up LazySysAdmin truly lives up to its name. This machine was configured by a lazy system administrator and thus, one clear thing to be looking for is a misconfigured system.
TECHNICAL Feed Your SIEM With Free Threat Intelligence Feeds Draw down free threat intelligence data to feed your security information and event management (SIEM) platform with these handy Powershell scripts.
CTF Moria 1.1 - Write-up Moria 1.1 Writeup - Moria is said to be an intermediate machine and it stays true to that, if you don't have a certain process to follow or refer to, you won't get the entry point.
TECHNICAL Simple Defenses vs Advanced Malware Defending your systems from advanced malware does not have to be difficult and costly. Learn how to improve your domain security with simple changes to tools you already own.
CYBERSEC Case Study: Wreaking Havoc via an API A deep dive case study from infosec writer Miguel Calles highlights the importance of addressing the highest OWASP security risk, injection.
CYBERSEC The Problem With Smart TV's Do you get angry at the thought of your television being smart instead of dumb? So does Guise Bule who explains the problems with smart tv's.
CYBERSEC Hundred Billion Dollar Infosec Question A Thought Experiment - If someone gave you a hundred billion dollars to spend on improving information security how would you spend it?
CYBERSEC How To Tell If Hackers Are Watching Hackers can gain control of your mobile device in a number of ways and sometimes there are tell tell signs, here are seven so you can catch them out.
CYBERSEC Social Engineering - Breaking the Brain Join security researcher Dan Dixon in an exploration of the brains inherent vulnerabilities in the context of social engineering your way to a target.