Lucian MoiseinTechnology HitsWhat is the Cyber Kill Chain in CyberSecurity?What is the Cyber Kill Chain in cyber security?Jul 18Jul 18
Lucian MoiseinInfoSec Write-upsIDORs: What are they and how to find themHow to find and exploit IDOR vulnerabilities in web applicationsJun 17Jun 17
Lucian MoiseinILLUMINATIONEU Dora & How to be CompliantThis is how to comply with the new EU regulationJun 112Jun 112
Lucian MoiseinInfoSec Write-upsMalware, viruses, worms, and Trojan horsesPhoto created by the author using an ideogramJun 6Jun 6
Lucian MoiseinInfoSec Write-upsMitigating MalwareThis is how you mitigate common network attacksJun 5Jun 5
Lucian MoiseinILLUMINATIONThis is how you do a backup of your computerComplete System backup/drive cloneJun 31Jun 31
Lucian MoiseinTechnology HitsThe word ‘hacker’ and what it meansHere is the difference between Grey, White, and Black Hat Hackers.May 28May 28
Lucian MoiseinInfoSec Write-upsGoogle Dorking | THMHow Search Engines Operate and Utilize Hidden ContentMay 15May 15