Published inInfoSec Write-upsHow a Chinese APT used Visual Studio Code for Command & ControlAs described in Unit42’s analysis, Chinese APTs have used Visual Studio Code’s tunnel feature to establish reverse shells. These shells are…Sep 16Sep 16
Published inSystem WeaknessWeb Application SecurityIn 2024, web application security remains a cornerstone of modern cybersecurity, protecting digital platforms from a growing spectrum of…Sep 6Sep 6
Bsides Munich 2023I recently had the pleasure of attending the Bsides Munich conference and want to share my experience.Oct 25, 2023Oct 25, 2023
Published inNerd For TechMy experience getting a Cybersecurity Job as a fresh graduateIn this article I want to share my experience in getting a cybersecurity job after freshly graduating my master’s in computer science.Oct 6, 2023Oct 6, 2023
What is the Cyber Kill Chain?The cyber kill chain is a model that describes the attack process on IT systems and identifies the stages that an attacker goes through to…Aug 31, 2023Aug 31, 2023
What is Cloud Security?First of all, what is the cloud anyway? The cloud is a model for delivering and accessing IT resources and applications over the Internet…Jul 1, 2023Jul 1, 2023
Cyber Security Trends 2023Cybersecurity experts are in demand like never before. With each passing year, more and more destructive hacks and vulnerabilities are…Mar 15, 2023Mar 15, 2023
Published inSystem WeaknessAnalysis and Modeling of U.S. Cyber Security SalariesThis article will analyze U.S. Cyber Security Salaries and build a machine learning model to predict expected salary.Feb 20, 20231Feb 20, 20231
Securing Windows Hosts: Best Practices and TipsIt is widely known that Windows is one of the most popular operating systems in use today, and it is estimated that over 90% of desktop…Feb 1, 2023Feb 1, 2023
The problem with SmbmapWhen using Smbmap in your Red Team engagement, keep in mind, that Smbmap creates a random directory at the root of each SMB Share to check…Jan 23, 2023Jan 23, 2023