InInfoSec Write-upsbyTide FoundationIt’s cybersecurity’s kryptonite: Why are you still holding it?Decoupling authority, so a breach leaves nothing for hackers to find.2d ago3
Chicken0248[LetsDefend Write-up] PowerShell ScriptYou’ve come across a puzzling Base64 script, seemingly laced with malicious intent. Your mission, should you choose to accept it, is to…Jun 10
Prof Bill Buchanan OBE FRSEHiding Data In BasesOne way that a spear phisher or malware writer can get around detection is to hide data in a different encoding format, such as…Mar 10Mar 10
InInfoSec Write-upsbyCyber Golden RetrieverThe Coolest Digital Forensics Challenge I Ever SolvedAs a man obsessed with both cybersecurity and puzzles, Capture The Flag (CTF) challenges are a dream come true. What’s a CTF challenge…Apr 21, 2023Apr 21, 2023
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEThe Wonderful Research of Ivan Damgård: Hashing, Homomorphic Encryption and Zero Knowledge ProofsIf you are into cybersecurity, then you will know all about the MD5 hashing method. But do you know what the MD part represents? Well, it…Sep 18, 2023Sep 18, 2023
InInfoSec Write-upsbyTide FoundationIt’s cybersecurity’s kryptonite: Why are you still holding it?Decoupling authority, so a breach leaves nothing for hackers to find.2d ago3
Chicken0248[LetsDefend Write-up] PowerShell ScriptYou’ve come across a puzzling Base64 script, seemingly laced with malicious intent. Your mission, should you choose to accept it, is to…Jun 10
Prof Bill Buchanan OBE FRSEHiding Data In BasesOne way that a spear phisher or malware writer can get around detection is to hide data in a different encoding format, such as…Mar 10
InInfoSec Write-upsbyCyber Golden RetrieverThe Coolest Digital Forensics Challenge I Ever SolvedAs a man obsessed with both cybersecurity and puzzles, Capture The Flag (CTF) challenges are a dream come true. What’s a CTF challenge…Apr 21, 2023
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEThe Wonderful Research of Ivan Damgård: Hashing, Homomorphic Encryption and Zero Knowledge ProofsIf you are into cybersecurity, then you will know all about the MD5 hashing method. But do you know what the MD part represents? Well, it…Sep 18, 2023
InAndroid AppSec by Safe to runbyDaniel LlewellynHacking & Securing “Insecure Shop” — Unprotected web viewsThis is the second in a series of articles that looks at hacking & securing this app:Jan 9, 2023
InCloud SecuritybyTeri RadichelCreating an AWS Governance AccountACM.139 Creating OUs and Accounts in an AWS OrganizationJan 23, 2023