Top 3 Initial Compromise MethodsThe field of Information technology is changing at a faster pace than ever. With platforms like Helios or Jenkins, we can see the daily…Jun 13Jun 13
Linux Security — What You Need to Know in 2024It is possible that you have heard that Linux is a more secure system than Windows, or that Linux systems can’t get infected. Both of…Jun 6Jun 6
AI race: ready, set… Breach!You should be aware of at least one of the many AI engines available on the internet to be used as products or embedded in some other…Feb 13Feb 13
Access Control ModelsAccess control is one of the pillars of IAM (Identity and Access management). Access control models are, as the name indicates, models that…Jan 16Jan 16
Secure protocols can be compromised to retrieve private RSA keys.A new vulnerability is discovered in some SSH and IPsec ImplementationsDec 9, 2023Dec 9, 2023
Security Frameworks what are they and why we need them?Security has become a big concern for many individuals and organizations. In certain cases it is because of the raised awareness, even…Oct 4, 2023Oct 4, 2023
Secure links might not be secure?If you have been around for any time, you would know that a best practice when you receive a short link is to actually expand the link to…Aug 5, 2023Aug 5, 2023
Unleashing the Power of APK Inspection: 3 Tools to Secure Your Mobile ExperienceToday I had an interesting conversation with a colleague. I am sure that you have probably heard that when it comes to mobile security one…Jul 29, 2023Jul 29, 2023
Published inInfoSec Write-upsTryHackMe Walthrough — BuggedIn this post I will walk you through the Room Bugged from Try Hack me. This room (Bugged) is designed to be an IoT hacking exercise, the…Mar 14, 20232Mar 14, 20232
Online scams will still be an issue this year!Online scams are fraudulent schemes that use the internet to trick individuals into providing sensitive information or losing money. They…Feb 1, 2023Feb 1, 2023