KeyboardSamuraiFrom Code to Chaos: How Generative AI is Fueling a Surge in Sophisticated Cyber AttacksDeepfakes, a rising threat within the broader category of synthetic media, the use of artificial intelligence and machine learning (AI/ML)…Oct 21Oct 21
KeyboardSamurai🔥“Is Your Code a Ticking Time Bomb?”The Best SAST Tools to Defuse Vulnerabilities Before the Bad Guys Strike! 💣🚀Sep 25Sep 25
KeyboardSamuraiThe Underbelly of PHP Security: How Obfuscation Makes Malicious Code InvisibleThe Dark Art of PHP Obfuscation: How Hackers Hide in Plain SightSep 1Sep 1
KeyboardSamuraiDIY Wardriving — Building your exploration arsenal PART 3Ok! the final part for this wardriving trilogy is already here!Jun 10Jun 10
KeyboardSamuraiDIY Wardriving: Building Your Wireless Exploration Arsenal — Part 2As promised here’s the second part and some of you been asking lately about the monitoring and observability stacks where we finally…May 12May 12
KeyboardSamuraiDIY Wardriving: Building Your Wireless Exploration Arsenal — Part 1“Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone. Software for…Nov 28, 2023Nov 28, 2023
KeyboardSamuraiAWS Cloud Security: Navigating the Maze of IsolationDissecting the Isolation MythNov 25, 2023Nov 25, 2023
KeyboardSamuraiUnveiling the Intricacies of Packet Filtering with Wireshark: A Technical Overview Exploration into…In the dynamic landscape of cybersecurity, the role of packet filtering stands paramount as a crucial line of defense against malicious…Nov 19, 2023Nov 19, 2023
KeyboardSamuraiNavigating the Slippery Slope of Cybersecurity: Puddle Attacks and TLS/SSL Dangers! 😱Greetings, cyber voyagers! Today, we embark on a journey through the treacherous terrain of cybersecurity, exploring the subtle dangers of…Nov 14, 2023Nov 14, 2023