Homepage
Open in app
Sign in
Get started
Stimulating insights into the minds of some of the worlds finest Cybersecurity experts.
Opinion Pieces
CyberTalks
Follow
Behind the Veil: Identifying Stealthy Tunnels in Windows Event Logs
Behind the Veil: Identifying Stealthy Tunnels in Windows Event Logs
What are tunneled connections? How to create them and how to detect them in Windows event logs?
Hod Felber
Aug 7, 2023
Uncovering a Message Thread Between Hackers Targeting Israeli Citizens
Uncovering a Message Thread Between Hackers Targeting Israeli Citizens
It is a known fact that civilians often fall prey to SMS phishing scams. Hackers try to take advantage of unsuspecting people, especially…
Mor David
Jun 6, 2023
No Portals Needed
No Portals Needed
Abusing a misconfiguration to bypass Palo Alto GlobalProtect VPN multi-factor-authentication.
Chen Levy Ben Aroy
Apr 24, 2023
Building a Modern Red Team Infrastructure
Building a Modern Red Team Infrastructure
As companies become more aware of the importance of increasing cybersecurity and incorporating red teaming evaluations into their advancing…
CYE
Feb 23, 2023
Azure AD Privilege Escalation through Auto Assignment Policies
Azure AD Privilege Escalation through Auto Assignment Policies
A recently released Azure AD Identity Governance feature can be abused for Privilege Escalation within Azure Environments through dynamic…
CYE
Nov 10, 2022
From Zero to Hero
From Zero to Hero
The Power of GCP Service Accounts
CYE
Sep 14, 2022
Creating a Python Slack Bot — The Monkey Guide
Creating a Python Slack Bot — The Monkey Guide
Confession: I really like guides that spell things out for me. Monkey see, monkey do.
CYE
Aug 14, 2022
About CYESEC
Latest Stories
Archive
About Medium
Terms
Privacy
Teams