The Hack that made Government push for PrivacyWe have been aware, at least since 2013, that the US government, as probably many others, spies and intercepts private communications from…Dec 6, 2024Dec 6, 2024
Top 3 Initial Compromise MethodsThe field of Information technology is changing at a faster pace than ever. With platforms like Helios or Jenkins, we can see the daily…Jun 13, 2024Jun 13, 2024
Linux Security — What You Need to Know in 2024It is possible that you have heard that Linux is a more secure system than Windows, or that Linux systems can’t get infected. Both of…Jun 6, 2024Jun 6, 2024
AI race: ready, set… Breach!You should be aware of at least one of the many AI engines available on the internet to be used as products or embedded in some other…Feb 13, 2024Feb 13, 2024
Access Control ModelsAccess control is one of the pillars of IAM (Identity and Access management). Access control models are, as the name indicates, models that…Jan 16, 2024Jan 16, 2024
Secure protocols can be compromised to retrieve private RSA keys.A new vulnerability is discovered in some SSH and IPsec ImplementationsDec 9, 2023Dec 9, 2023
Security Frameworks what are they and why we need them?Security has become a big concern for many individuals and organizations. In certain cases it is because of the raised awareness, even…Oct 4, 2023Oct 4, 2023
Secure links might not be secure?If you have been around for any time, you would know that a best practice when you receive a short link is to actually expand the link to…Aug 5, 2023Aug 5, 2023
Unleashing the Power of APK Inspection: 3 Tools to Secure Your Mobile ExperienceToday I had an interesting conversation with a colleague. I am sure that you have probably heard that when it comes to mobile security one…Jul 29, 2023Jul 29, 2023
Published inInfoSec Write-upsTryHackMe Walthrough — BuggedIn this post I will walk you through the Room Bugged from Try Hack me. This room (Bugged) is designed to be an IoT hacking exercise, the…Mar 14, 2023Mar 14, 2023