Mlytics SOC EngineersinMlyticsRansomware Attack!?! Let’s Learn from the Attack on Indonesia’s Pusat Data Nasional (PDN)Hey guys! Did you hear about the recent cyberattack on Indonesia’s Government Data Center (PDN)? On June 20, 2024, the center was hit by a…5d ago
Achim KochDoes my AEM have a backdoor?Authentication in AEM is centralized in Adobe IMS — with a few exceptions. Learn about these exceptions to harden your installation.Mar 17
Ott3rlyAdvanced SQLMap CustomizationDo you know that you can add custom payloads to the SQLMap? This tool is powerful out of the box, but with advanced customization, you can…Jul 8Jul 8
Bosun SogekeHow To Manage Evolving IT Security Risks with Generative AIIn today’s digital age, IT security risks are continuously evolving, posing significant challenges for organisations. Traditional…Jul 7Jul 7
Mlytics SOC EngineersinMlyticsRansomware Attack!?! Let’s Learn from the Attack on Indonesia’s Pusat Data Nasional (PDN)Hey guys! Did you hear about the recent cyberattack on Indonesia’s Government Data Center (PDN)? On June 20, 2024, the center was hit by a…5d ago
Achim KochDoes my AEM have a backdoor?Authentication in AEM is centralized in Adobe IMS — with a few exceptions. Learn about these exceptions to harden your installation.Mar 17
Ott3rlyAdvanced SQLMap CustomizationDo you know that you can add custom payloads to the SQLMap? This tool is powerful out of the box, but with advanced customization, you can…Jul 8
Bosun SogekeHow To Manage Evolving IT Security Risks with Generative AIIn today’s digital age, IT security risks are continuously evolving, posing significant challenges for organisations. Traditional…Jul 7
Aardvark InfinityinAardvark InfinityThe Role of AI and Scripting in Enhancing CybersecurityBy: Aardvark InfinityJul 4
Andreas LeicherinkotaicodeAWS IAM Roles for Kubernetes Pods in EKSAmazon Elastic Kubernetes Service (EKS) simplifies the deployment and management of Kubernetes clusters on AWS. As organizations transition…Jan 19
Bertrand RothenFraud Prevention for Mobile Apps — Inside the App: Product Management Case StudyEmploying various methods of doing urgent and strategic fraud prevention, we secured two different apps from different potential exploit…Jul 2