Pepijn VissersDeception 101 — Part 3: Documents with passwordsIncreasing the chance of catching criminal hackers is essential in both furthering the reduction of cybercrime and for identifying hackers…Dec 8, 2023Dec 8, 2023
Pepijn VissersDeception 101 — Part 2: Honeytoken account in Active DirectoryIntroductionNov 23, 2023Nov 23, 2023
Pepijn VissersDeception 101 — Part 1: PrerequistesIncreasing the chance of catching criminal hackers is essential in both furthering the reduction of cybercrime and for identifying hackers…Nov 17, 2023Nov 17, 2023
Pepijn VissersDeceptie 101: Level 2 — Documenten met wachtwoordenLiving off the land, tripwired.Nov 10, 2023Nov 10, 2023
Pepijn VissersDeceptie 101: Level 1 — Honeytoken-account in Active DirectoryEen serie artikelen over het plaatsen van struikeldraadjes in je netwerk.Oct 10, 2023Oct 10, 2023
Crypt0janClassification in Confluence… done right.We did a thing and built a classification app for Confluence that runs with minimal rights.Sep 18, 2023Sep 18, 2023
Tom WoltersThe Year Of The White RabbitIn January 2023 the Chinese New Year of the Rabbit started. A mere coincidence as we (Chapter8) were just busy with reporting a serious…Sep 18, 2023Sep 18, 2023
Tom WoltersUsing Your Tools Against YouHow your tools can become an attack vectorSep 18, 2023Sep 18, 2023
Tom WoltersSafer Internet Day: How To Coordinated Vulnerability Disclosure7 Feb is Safer Internet Day! How can you contribute to a safer internetSep 18, 2023Sep 18, 2023