Andrew ReboraState-Sponsored Cyber Operations Against COVID-19 Research CentersIt is well known that state-sponsored cyber groups, formally known as advanced persistent threat (APT) groups, are constantly operating to…Jul 16, 2020Jul 16, 2020
Andrew ReboraAn Overview of Deloitte’s “Cyber Smart” Report: What Can We Learn From Singapore?Cyber risk is inevitable. The solution is not avoiding digitization; rather, it is investing in cyber preparedness.May 27, 2020May 27, 2020
Andrew ReboraBrowser Exploitation and Advanced Threat Actors: An Overview of BeEFRecently, several experts discussed specific tools used by threat actors to conduct their operations. Among them, there is a publicly…Feb 8, 2020Feb 8, 2020
Andrew Rebora[CTF Walkthrough] hackNos: Os-HaxTo improve my skills and refine my knowledge, I have decided to complete some capture the flag (CTF) challenges and release guides on how…Jan 21, 2020Jan 21, 2020
Andrew ReboraHow to Obtain User Credentials and Remote Access Using Social EngineeringAs I mentioned in my previous article (https://link.medium.com/rq51sS4H92), social engineering is the act of deceiving someone into acting…Jan 16, 2020Jan 16, 2020
Andrew ReboraHow to hack an Android phone using QR codesI want to begin this article with a disclaimer: the method I am going to illustrate is one of several. It is not completely automatic…Jan 11, 20201Jan 11, 20201
Andrew ReborainCoinmonksThe Use of Cryptocurrency for Money LaunderingMoney laundering is the process of disguising the proceeds of crime and integrating it into the legitimate financial system. Thanks to…Dec 29, 2019Dec 29, 2019