Published inInfoSec Write-upsHow a Chinese APT used Visual Studio Code for Command & ControlAs described in Unit42’s analysis, Chinese APTs have used Visual Studio Code’s tunnel feature to establish reverse shells. These shells are…Sep 16, 202457Sep 16, 202457
Published inSystem WeaknessWeb Application SecurityIn 2024, web application security remains a cornerstone of modern cybersecurity, protecting digital platforms from a growing spectrum of…Sep 6, 20241Sep 6, 20241
Bsides Munich 2023I recently had the pleasure of attending the Bsides Munich conference and want to share my experience.Oct 25, 20239Oct 25, 20239
Published inNerd For TechMy experience getting a Cybersecurity Job as a fresh graduateIn this article I want to share my experience in getting a cybersecurity job after freshly graduating my master’s in computer science.Oct 6, 202378Oct 6, 202378
What is the Cyber Kill Chain?The cyber kill chain is a model that describes the attack process on IT systems and identifies the stages that an attacker goes through to…Aug 31, 202335Aug 31, 202335
What is Cloud Security?First of all, what is the cloud anyway? The cloud is a model for delivering and accessing IT resources and applications over the Internet…Jul 1, 202351Jul 1, 202351
Cyber Security Trends 2023Cybersecurity experts are in demand like never before. With each passing year, more and more destructive hacks and vulnerabilities are…Mar 15, 20232Mar 15, 20232
Published inSystem WeaknessAnalysis and Modeling of U.S. Cyber Security SalariesThis article will analyze U.S. Cyber Security Salaries and build a machine learning model to predict expected salary.Feb 20, 2023851Feb 20, 2023851
Securing Windows Hosts: Best Practices and TipsIt is widely known that Windows is one of the most popular operating systems in use today, and it is estimated that over 90% of desktop…Feb 1, 2023Feb 1, 2023
The problem with SmbmapWhen using Smbmap in your Red Team engagement, keep in mind, that Smbmap creates a random directory at the root of each SMB Share to check…Jan 23, 2023Jan 23, 2023
Published inSystem Weakness11 Tips for creative and continous Security Awareness#1 Offer your employees books about Social EngineeringJan 20, 2023Jan 20, 2023
Published inSystem WeaknessScheduled Tasks for Cyber Security ProfessionalsWhat are Scheduled Tasks?Dec 18, 2022Dec 18, 2022
TryHackMe — Dig Dug WriteUpDig Dug is an Easy level CTF on TryHackMe. It has the following challenge description:Nov 27, 2022Nov 27, 2022
Published inSystem WeaknessTryHackMe — Brute WriteUpBrute is a CTF room on TryHackMe with “Medium” difficulty.Nov 20, 2022Nov 20, 2022
Published inSystem WeaknessTryHackMe — That’s The Ticket WriteUpThat’s the Ticket is a boot2root CTF on TryHackMe. The room has “Medium” difficulty.Nov 13, 2022Nov 13, 2022
Web Security Academy — Blind OS command injection with time delaysThis lab is part of the Web Security Academy by Portswigger. It is under the category “OS command injection”. This time we have to exploit…Nov 6, 2022Nov 6, 2022
The Cyber War between RUSSIA and UKRAINE explainedIn this article I describe key happenings in the cyber war between Ukraine and RussiaNov 2, 2022Nov 2, 2022
What does a DATA PROTECTION OFFICER do?In this article I will describe the role of an Data Protection Officer.Sep 9, 2022Sep 9, 2022