INFOSEC Rise of the Nigerian Cybercrime Princes The complexity of these scams is dependent on the duration of operation, the targets, the potential proceeds, and the versatility of the format.
OSINT Mastodon OSINT: A Comprehensive Introduction Part one in our series on Mastodon, focused on gathering OSINT from the platform's users, instances and network.
OSINT OSINT: The Mastodon Paedophile Problem Mastodon has a major paedophile problem, join computer scientist Edward Charles for a closer look at the pedophilic side of the fediverse.
INFOSEC What You Overlook In Malware Analysis When infosec people hear "malware analysis" most jump directly to binary analysis and reverse engineering.
INFOSEC Unhackable Things: Notes On Formal Verification Formal verification is all about writing mathematical proofs, which show the correctness (or incorrectness) of a thing.
INFOSEC A Quick Look At YARA YARA is a tool aimed at helping malware researchers to identify and classify malware samples.
INFOSEC CORS – Cross-Origin Resource Sharing – What, how, and why? Have you ever wondered how API resources can browse safely from domain origins other than the server?
INFOSEC Supply Chain Attacks Organizations need to understand the dependencies they're injecting into their networks and applications.
INFOSEC Mastodon: A Social Media Platform Dominated By Pedophiles & Child Porn Following a Secjuice investigation, it has become clear that Mastodon is a social media platform dominated by pedophiles and most of its content is child porn.
INFOSEC Is Infosec Really Leaving Twitter For Mastodon? Is the infosec space really leaving Twitter? We sent our top investigative reporter onto the website known as Twitter to find out!
INFOSEC An Intro To DevSecOps An introduction to DevSecOps from a fallen comrade who wishes to remain anonymous.
INFOSEC How to Break into Infosec With Zero Expertise Want to break into cybersecurity but lack the relevant experience? Learn how in seven easy steps.
INFOSEC Child Porn Allegations At Patreon After Security Team Fired Shortly after Patreon dismissed their whole cybersecurity team, allegations of illegal activity and child porn emerge.
INFOSEC A Criminal Vulnerability Disclosure The story of German hacker Lilith Wittmann who ran into trouble with the law after finding a security vulnerability.
INFOSEC Application Security 101 A short guide to application security aimed at newcomers to the subject.
INFOSEC How To Market Your Cyber Startup One of the often-neglected sides of the tech industry is understanding how to market yourself and your product.
INFOSEC User Account Control Bypass For Windows 11 & Windows Server 2022 Security researcher Patrick Hoogeveen cracks open Windows UAC to bypass it for your viewing pleasure.
INFOSEC The Zero Trust Handbook (1) A high level introduction to the zero trust cybersecurity movement explained in layman’s terms.
INFOSEC We Are All Hacktivists Now Our adversaries allow cybercrime groups to flourish within their borders, while we demonize our hacker communities.
INFOSEC The CIA Triad The CIA Triad may sound like an unholy alliance of the CIA and Chinese gangsters, but is actually good practice.
INFOSEC Legality & The IT Army Of Ukraine Hundreds of thousands of infosec professionals signed up for cyberwar without realizing it might make them cyber combatants.
INFOSEC DeTy: A Website For The Missing People Of Ukraine De Ty? Де Ти? Where Are You? Volunteers from the infosec space built a website for the missing people of Ukraine.
INFOSEC Secjuice Squeeze 77 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
INFOSEC Security Should Start with the Involvement of Top Management Security researcher Alesanco explains why top management in an organization plays an important role in security, and how an organization can secure its assets by assessing risks and having a Business Continuity Plan (BCP) in place... and much much more.
INFOSEC Log4Shell Explained to Your Non-Technical Friend Security researcher Andrea Barracu explains how the Log4Shell vulnerability works in a digestible manner for those who are non-technical and still want to grasp an understanding of it.