PinnedCase Study: The Uber HackIn this section, we explore a cyberattack experienced by the company Uber. As in the previous case study, we will analyze the methods…Oct 1, 2023Oct 1, 2023
Published inEmerge<in>TechCryptography 101: Why Is Predictability Often the Enemy of Security?Imagine you have a random number generator that creates a sequence of numbers. The shorter the sequence, the easier it is to guess. Think…Nov 10, 20241Nov 10, 20241
Cyber ResilienceIn this section, we talk about abstract insights from a part of our research on a concept that plays a significant role in strengthening…Aug 14, 2024Aug 14, 2024
Vulnhub: PWNOS 2.0In this part, we demonstrate two methods to compromise a target system and elevate privileges. The first method utilizes an exploitation…Jun 29, 2024Jun 29, 2024
Vulnhub: Misdirection1Walkthrough of the Capture the Flag (CTF) challenge on Vulnhub.Jun 22, 2024Jun 22, 2024
Backdoor Attack and Defense on a Convolutional Neural NetworkIn this part, we are going to explore backdoor attacks and defenses. We will train clean and backdoored models using the CIFAR-10 dataset…May 2, 2024May 2, 2024
Evasion Attacks on a Convolutional Neural NetworkThe task involves conducting two evasion attacks on a Machine Learning model. Initially, we train our model using the CIFAR-10 dataset…Apr 14, 2024Apr 14, 2024
Anatomy of Cyber AttacksIn a large-scale security incident, you would want to immediately assess where the attackers are in the kill chain. Understanding their…Jan 24, 2024Jan 24, 2024
Current State of the Next-Generation FirewallsThe NSS Labs 2018 Security Report, dated July 17, 2018, analyzes the performance of leading Next Generation Firewalls (NGFWs) from…Jan 21, 2024Jan 21, 2024