Steve AluochAnalyzing a Suspicious File Using VirusTotal and the Pyramid of PainWriting Inspired by My Google Cybersecurity Certificate ProjectsNov 26
Kevin FinnertyUnravelling the Mystery of the O.MG Cable: A Cybersecurity Threat in DisguiseIn the evolving landscape of cybersecurity, the line between everyday objects and potential threats has become increasingly blurred. One…Feb 7
InXint BlogbyXintSide Effects: When Continuous Development Introduces Security ThreatsDive into five significant security risks that emerged as unintended consequences of new feature development.Nov 4Nov 4
InBits and PiecesbyLahiru HewawasamTop Security Threats to Microfrontends and How to Mitigate ThemJun 5, 2023Jun 5, 2023
Syeda Aresha Sohail ShahIndian Chronicles: A Threat to Pakistan’s Image and National SecurityThe Indian Chronicles, a massive disinformation campaign exposed by the EU DisinfoLab has been at work for more than 15 years as a…Sep 177Sep 177
Steve AluochAnalyzing a Suspicious File Using VirusTotal and the Pyramid of PainWriting Inspired by My Google Cybersecurity Certificate ProjectsNov 26
Kevin FinnertyUnravelling the Mystery of the O.MG Cable: A Cybersecurity Threat in DisguiseIn the evolving landscape of cybersecurity, the line between everyday objects and potential threats has become increasingly blurred. One…Feb 7
InXint BlogbyXintSide Effects: When Continuous Development Introduces Security ThreatsDive into five significant security risks that emerged as unintended consequences of new feature development.Nov 4
InBits and PiecesbyLahiru HewawasamTop Security Threats to Microfrontends and How to Mitigate ThemJun 5, 2023
Syeda Aresha Sohail ShahIndian Chronicles: A Threat to Pakistan’s Image and National SecurityThe Indian Chronicles, a massive disinformation campaign exposed by the EU DisinfoLab has been at work for more than 15 years as a…Sep 177
Suba WarranWhat is Driving the nexus of migration, security, and identity politics?Reading Summary : Yannis A. Stivachtis (2008) “International Migration and the Politics of Identity and Security”. Journal of Humanities &…May 17, 2022
Tapendra DevNavigating National Security and Cyber Defense: The Antivirus Software DilemmaIn a world increasingly reliant on digital infrastructure, the intersection of national security and cybersecurity has become a focal point…Jun 21
Krina PatelThreat Intelligence ToolsExplore different OSINT tools used to conduct security threat assessments and investigations.Feb 25, 2023