Justin KohlerinPosts By SpecterOps Team Members3 Foundational Pillars for Attack Path Management: Pillar 2 — Empirical Impact AssessmentAttack Paths are the chains of abusable privileges and user behaviors that create direct and indirect connections between Active Directory…Jan 27, 2022Jan 27, 2022
SybernixOverview of Threats to Cybersecurity and Their Countermeasures1. IntroductionNov 19, 20211Nov 19, 20211
Josué CarvajalAn overview of Threat Intelligence in CybersecuritySecurity is growing faster than ever, and some concepts need to be a must-know in order to be able to understand the security posture of…Mar 8, 20221Mar 8, 20221
CoolTechZone - Cyber Security Labs & NewsA Hacker’s Guide to Google DorksWant to get more out of your Google Search Engine? Want to start on the path of vulnerability research? We would like to introduce you to…Dec 7, 2021Dec 7, 2021
ZalwertEthical Hacking (part 1.0/20): Footprinting and Reconnaissance with examples and toolsNote: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and…May 25, 2021May 25, 2021