Gr@ve_RoseCUPS VulnerabilityRecently, evilsocket released a document about remotely exploiting the CUPS service with root privileges. I’m going to take this…Sep 27
InTheSecMasterbyArunklHow to Fix CVE-2024–20272 — An Unauthenticated Arbitrary File Upload Vulnerability in Cisco Unity…Cisco recently published an advisory detailing a critical vulnerability in its Unity Connection unified messaging solution that could allow…Feb 27Feb 27
Nykolas ZPhishing Protection — Comparing DNS Security FiltersI was reading an article from Brian Krebs about the Real Jokers Stash and the crazy stuff that goes into the darkweb / cybercrime forums…May 31, 20186May 31, 20186
Petr JakubecHow to Threat ModelingThis article is compilation of design thinking and tips + images from the CCC. For brainstorming workshop with teams just use visual board.Feb 13Feb 13
Gr@ve_RoseCUPS VulnerabilityRecently, evilsocket released a document about remotely exploiting the CUPS service with root privileges. I’m going to take this…Sep 27
InTheSecMasterbyArunklHow to Fix CVE-2024–20272 — An Unauthenticated Arbitrary File Upload Vulnerability in Cisco Unity…Cisco recently published an advisory detailing a critical vulnerability in its Unity Connection unified messaging solution that could allow…Feb 27
Nykolas ZPhishing Protection — Comparing DNS Security FiltersI was reading an article from Brian Krebs about the Real Jokers Stash and the crazy stuff that goes into the darkweb / cybercrime forums…May 31, 20186
Petr JakubecHow to Threat ModelingThis article is compilation of design thinking and tips + images from the CCC. For brainstorming workshop with teams just use visual board.Feb 13
Binh LamPractical Guide to Nmap Scanning for Network Security Assessment and DDoS Risk EvaluationNmap, or Network Mapper, is a powerful open-source tool for network scanning and security auditing. With Nmap, you can detect devices on a…May 27, 2023
L4V4NY4 AGR3Net Sec ChallengePractice the skills you have learned in the Network Security module.Jan 8