Pepijn VissersDeception 101 — Part 3: Documents with passwordsIncreasing the chance of catching criminal hackers is essential in both furthering the reduction of cybercrime and for identifying hackers…15 min read·Dec 8, 2023----
Pepijn VissersDeception 101 — Part 2: Honeytoken account in Active DirectoryIntroduction11 min read·Nov 23, 2023----
Pepijn VissersDeception 101 — Part 1: PrerequistesIncreasing the chance of catching criminal hackers is essential in both furthering the reduction of cybercrime and for identifying hackers…10 min read·Nov 17, 2023----
Pepijn VissersDeceptie 101: Level 2 — Documenten met wachtwoordenLiving off the land, tripwired.14 min read·Nov 10, 2023----
Pepijn VissersDeceptie 101: Level 1 — Honeytoken-account in Active DirectoryEen serie artikelen over het plaatsen van struikeldraadjes in je netwerk.11 min read·Oct 10, 2023----
Crypt0janClassification in Confluence… done right.We did a thing and built a classification app for Confluence that runs with minimal rights.4 min read·Sep 18, 2023----
Tom WoltersThe Year Of The White RabbitIn January 2023 the Chinese New Year of the Rabbit started. A mere coincidence as we (Chapter8) were just busy with reporting a serious…6 min read·Sep 18, 2023----
Tom WoltersUsing Your Tools Against YouHow your tools can become an attack vector5 min read·Sep 18, 2023----
Tom WoltersSafer Internet Day: How To Coordinated Vulnerability Disclosure7 Feb is Safer Internet Day! How can you contribute to a safer internet5 min read·Sep 18, 2023----