PinnedSecuring the Frontend: A Practical Guide for DevelopersAs our digital landscape continues to expand, the synergy between frontend development and cybersecurity becomes increasingly critical…Dec 3, 2023Dec 3, 2023
Published inInfoSec Write-upsFlipper Zero Episode 1: What It Is, What You Can Do, and How to Set It Up ?Welcome to the first post in this Flipper Zero series! If you’ve ever been curious about this little hacking gadget, you’re in the right…1d ago1d ago
Published inInfoSec Write-upsSimulating Phishing Attacks with Gophish: A Comprehensive GuideLearn how to deploy Gophish on Railway, run phishing simulations, and boost employee awareness to defend against phishing attacks.Feb 171Feb 171
From English Teacher to Penetration Tester: My Cybersecurity JourneyFrom English teacher to pentester: growth, mentorship, and new skills in cybersecurity. Overcoming doubt, embracing new opportunities.Dec 13, 2024Dec 13, 2024
Published inInfoSec Write-upsThe ‘I Love You’ That Broke the Internet: A Love Letter Turned Cyber NightmareThe ‘I Love You’ virus, a simple love letter turned cyber nightmare, caused billions in damages and changed cybersecurity forever.Dec 5, 2024Dec 5, 2024
Published inInfoSec Write-upsHow You Can Hack and Take Over a Car in 30 Seconds: Lessons from Sam Curry’s ResearchIn June 2024, Sam Curry uncovered a series of significant security vulnerabilities in Kia vehicles, which enabled attackers to remotely…Oct 7, 2024Oct 7, 2024
Published inInfoSec Write-upsSubnetting 101: Simple Guide to IP AddressingIf you’re just stepping into the world of IT and cybersecurity, you might have already come across the term “subnetting.” It can seem like…Sep 27, 2024Sep 27, 2024
Published inInfoSec Write-upsMobSF: Simplifying Mobile App Security TestingMobile apps are everywhere — helping us order food, check our bank accounts, connect with friends, and even track our fitness goals. With…Sep 18, 20241Sep 18, 20241
Unmasking USDoD: The Brazilian Hacker Who Shook American CybersecurityThe world of cybersecurity has been rocked by the recent revelation of the true identity behind USDoD, also known as EquationCorp. This…Aug 24, 2024Aug 24, 2024
You’re Not as Safe as You Think! The Methods Hackers Use to Access Your AccountsYou’ve probably heard stories of accounts getting hacked, sensitive information stolen, and the chaos that follows. But have you ever…Aug 21, 2024Aug 21, 2024