Published inSystem WeaknessThe relevance of Azure PentestingBusinesses in today’s digital landscape are increasingly shifting their workloads to the cloud. One of the cloud providers used by these…4d ago4d ago
Published inInfoSec Write-upsHow a Chinese APT used Visual Studio Code for Command & ControlAs described in Unit42’s analysis, Chinese APTs have used Visual Studio Code’s tunnel feature to establish reverse shells. These shells are…Sep 16, 2024Sep 16, 2024
Published inSystem WeaknessWeb Application SecurityIn 2024, web application security remains a cornerstone of modern cybersecurity, protecting digital platforms from a growing spectrum of…Sep 6, 2024Sep 6, 2024
Bsides Munich 2023I recently had the pleasure of attending the Bsides Munich conference and want to share my experience.Oct 25, 2023Oct 25, 2023
Published inNerd For TechMy experience getting a Cybersecurity Job as a fresh graduateIn this article I want to share my experience in getting a cybersecurity job after freshly graduating my master’s in computer science.Oct 6, 2023Oct 6, 2023
What is the Cyber Kill Chain?The cyber kill chain is a model that describes the attack process on IT systems and identifies the stages that an attacker goes through to…Aug 31, 2023Aug 31, 2023
What is Cloud Security?First of all, what is the cloud anyway? The cloud is a model for delivering and accessing IT resources and applications over the Internet…Jul 1, 2023Jul 1, 2023
Cyber Security Trends 2023Cybersecurity experts are in demand like never before. With each passing year, more and more destructive hacks and vulnerabilities are…Mar 15, 2023Mar 15, 2023
Published inSystem WeaknessAnalysis and Modeling of U.S. Cyber Security SalariesThis article will analyze U.S. Cyber Security Salaries and build a machine learning model to predict expected salary.Feb 20, 20231Feb 20, 20231