CYBERSEC The Best Password Managers and Why You Should Use One Learn about the best password managers, what a password manager is, how they work & why you should be using one. LastPass, 1Password & KeePass make it simple.
CYBERSEC How To Setup SSL With LetsEncrypt for Linux & Windows LetsEncrypt is a great free alternative to paid SSL certs, in this guide Security Engineer @zuphzuph shows you how to set it up for Linux and Windows.
INFOSEC Why Does Google Insist On HTTPS & Penalize You For Not Having It? What is the difference between HTTP and HTTPS? In this article security researcher Stephen Chapendama breaks it down and explains it for us.
INFOSEC Telegram Messenger: Security Overview Telegram is one of the most popular messaging apps. But is it worth using from a security perspective? Let’s figure it out.
CYBERSEC APT-Style Spearphishing: How Is It Used To Target High Value Individuals? Learn about APT style spear phishing and how it can be used in attacks against high value individuals, in our latest article from security researcher Max Bishop.
A Modern History of Russian Cyberwarfare In his latest article, Max Bishop gives us a briefing on the state of Russian cyber warfare and postulates that Russian involvement and planning is far more grim than most of us realize.
CYBERSEC Modern Wardriving: An Analysis Security researcher Max Bishop performs an evaluation of the state of modern urban networking as it relates to WEP/WPA2 cracking & wardriving in Grand Rapids, MI.
OSINT NumSpy: How To Find The Details of Any Mobile Number in India Learn how to find the details of any mobile phone number in India when conducting an OSINT operation, in the latest article by security researcher Sameer Bhatt.
CYBERSEC Social Engineering an Executive, an Employee, and a Grandma Jon Santavy spent the day meeting with businesses and people to learn about their challenges with cybersecurity - specifically the role that people play in security.
INFOSEC Web Scraping And Why You Shouldn’t Publish Your Email Address Learn about web scraping, why you should never publish your email address on the internet and what happens when your email has been scraped with Alessandro Innocenzi.
Sniffing The Traces Left Behind By Deleted Files On Hard Disks Security researcher Shivan Sengar discusses about how files are stored in the hard-disks and the measures that should be taken to secure those files.
The Secjuice Guidebook Welcome to the definitive Secjuice guidebook! Your guide to our community and the Secjuice publishing process.
CYBERSEC How To Gain Infosec Experience Without An Infosec Job Want to find a job in infosec but lack the necessary experience? Check out Alessandro Innocenzi's guide to earning that experience in pentest labs, sandboxes and bounty programs.
INFOSEC Embedding Security In Your Development Process In his latest article Alessandro Innocenzi teaches us how to embed security at the heart of your development lifecycle.
CYBERSEC How To Setup Miners For Monero (XMR) Learn how to securely set up and operate a Monero miner, to mitigate against cyber theft with Alessanco Innocenzi.
OSINT OSINT Is A State Of Mind OSINT is a state of mind argues master OSINT practitioner Dutch OSINT Guy and true ‘OSINTians’ are members of a small group who go public on their skills, knowledge and findings.
CYBERSEC Kali Linux vs Parrot - Whats Different? In this article Rohan Chavan tells us the ten reasons why he prefers Parrot and gives us the key differences between Kali Linux and Parrot Sec.
OSINT OSINT Isn’t Evidence - InfoSec Needs To Take A Step Back & Breathe OSINT isn't evidence argues cybersecurity author Jeffrey Carr and the infosec space needs to take a step back when it comes to thinking of OSINT in that way.
OSINT An OSINT Script For Scanning Multiple Organizations Using Shodan and Golang Security researcher Wojciech created a great OSINT script to scan multiple organizations using Shodan & Golang.
OSINT The Daily Dose Of Malware OSINT Script For Hunting Fresh Malware Samples Security researcher Wojciech created a brilliant OSINT script to help him harvest fresh malware samples that he calls the 'Daily Dose Of Malware'.
Controlling Dwell Time Is About Much More Than Compliance Breach detection and controlling dwell time is about much more than compliance argues Robert MacMillan.
INFOSEC The 100 Million Dollar Infosec Question If someone gave you 100 million dollars to improve information security, how would you spend it asks Dan Klinedinst in this infosec thought experiment.
CYBERSEC A Closer Look At The Hacker Known As AKILL Remember Owen Walker? Well Gabriel Duarte does and in this article gives us the lowdown on the hacker known as AKILL.
INFOSEC Privacy And The Trail You Leave Behind In a world where everyone is over exposed in the context of privacy the, coolest thing you can do is maintain your mystery argues Shivam Singh Sengar.
INFOSEC Compliance Is Who You Are Not What You Do In this article Bryan Brannigan explains why compliance is something that you are and not something that you do, an interesting perspective on compliance.