Netscylla Cyber SecurityBlogging Moved to Main Websitehttp://www.netscylla.com/blogDec 22, 2019Dec 22, 2019
Netscylla Cyber SecurityWhen Resilience Fails, Don’t Panic!With ransomware and wiperware being the criminals choice of earning a quick buck, having a secure backup is more important than ever. But…Oct 18, 2018Oct 18, 2018
Netscylla Cyber SecurityWerkzeug DebuggerOne of the most popular WSGI utility frameworks for Python is Werkzeug. It simplifies the handling of HTTP connections within your Python…Oct 3, 2018Oct 3, 2018
Netscylla Cyber SecurityKibana, Wazuh and Bro IDSRecently we have been helping SME’s increase their cyber detection capabilities, with some Open Source and freely available tools. In this…Sep 18, 2018Sep 18, 2018
Netscylla Cyber SecurityHacking MongoDBAnother day, another breach. But this time an unsecured mongodb instance in the cloud…Sep 13, 2018Sep 13, 2018
Netscylla Cyber SecurityHunt for AWS Unrestricted E/In-gressCentre of Information Security (CIS) for Amazon Web Services has a networking section and two points related to security management of AWS…Sep 3, 2018Sep 3, 2018
Netscylla Cyber SecurityRoll your own AWS Lambda in 5 easy stepsBelow we walk though a very simple example of writing your own serverless code / Lambda functions from a Linux workstation.Sep 2, 2018Sep 2, 2018
Netscylla Cyber SecurityDefend against Domain-Fronting with JA3Modern day cyber-criminals and legitimate Red-Teaming are increasingly using cyber squatted domains (including bitsquatting and homoglyphs)…Aug 9, 2018Aug 9, 2018
Netscylla Cyber SecurityCracking WPA1/2/Enterprise with HCXToolsA new technique to crack WPA PSK (Pre-Shared Key) passwords.Aug 8, 2018Aug 8, 2018