Why Subscribing to Security Notifications is Crucial

Cisco has just issued a critical security advisory concerning a high-impact vulnerability affecting devices running IOS XE. This flaw could potentially grant malicious actors complete control over the compromised device. For detailed information, you can check out the advisory directly here: [Cisco Security Advisory]. This incident serves as a stark reminder of the paramount importance … Read more

Categories Uncategorized

Why Every IT Professional Should Subscribe to Security Notifications

Cisco has just issued a critical security advisory concerning a high-impact vulnerability affecting devices running IOS XE. This flaw could potentially grant malicious actors complete control over the compromised device. For detailed information, you can check out the advisory directly here: [Cisco Security Advisory](Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature). This incident … Read more

Categories Uncategorized

OSINT Mastery Unveiled: Vinny Troia’s ‘Hunting Cyber Criminals’ Review

Like many individuals interested in cybersecurity, I understand the significance of OSINT (Open Source Intelligence) in uncovering crucial information and identifying potential threats. If you’re looking to expand your knowledge of OSINT tools and techniques, try Vinny Troia’s “Hunting Cyber Criminals: A Hacker’s Guide to Online Intelligence Gathering Tools and Techniques.” As an avid cybersecurity … Read more

Categories Uncategorized

Discovering the Gems of Cybersecurity: The Cybersecurity Canon

I’m always looking for new cybersecurity reads but have trouble selecting/prioritizing the next read out of the sea of options out there. I recently stumbled upon the “Cybersecurity Canon” and it looks like this is the solution to my problem. If you’re like me, struggling to prioritize your next cybersecurity read, this incredible resource is … Read more

Categories Uncategorized

The Power of Social Media in Cybersecurity

I won’t ask you to hit any “like” buttons or subscribe to my social media accounts in this post; however, we can’t ignore the immense value that social media platforms, especially Twitter, bring to the cybersecurity community. Social media often gets a bad rap, perceived as a breeding ground for self-centeredness and attention-seeking. But when … Read more

Categories Uncategorized

Veracrypt: The Encryption Software that Keeps your Secrets Safe…Even from the Authorities (“Hidden Volumes” and Plausible Deniability)

As a cybersecurity expert, I am always on the lookout for powerful and versatile encryption tools to keep sensitive information safe. Veracrypt is one such tool that stands out for its powerful encryption capabilities and its unique plausible deniability feature. Veracrypt is a piece of encryption software that has a proven track record of providing … Read more

DMARC Reports And How Awesome They Are For E-mail Security

DMARC is the abbreviation for ‘Domain-Based Message Authentication Reporting and Conformance’. DMARC is an email authentication and security protocol (like SPF and DKIM; I explain SPF and DKIM in other separate blog posts) that protects a business organization’s email domain from being misused by malicious actors for phishing scams and email spoofing. This post is going to provide … Read more

The Hacker Manifesto

Found the below forum post on a big, infamous, dark web forum. On Jan. 8, 1986, the essay, written by a hacker known as The Mentor, was published in the hacker zine Phrack. You can find the text on plenty of hacking-related websites and in pop culture, to include it being excerpted in the 1995 … Read more

Categories Uncategorized

Privacy and Security Guides

͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏  Security Researchers Krebs on Security Lots of up-to-date, in-depth interesting cyber security news and investigations, by a true legend in the field and NY Times Bestseller, Brian Krebs. Schneier on Security Commentary, news, essays and more all about cryptography, cyber security and privacy. New posts are written almost daily, and this is also home … Read more

Open Source Intelligence (OSINT): E-mail Harvesting

Did you know that hackers can easily obtain your company’s email addresses using open source intelligence (OSINT) tools like Hunter.io? But what exactly is OSINT and how does Hunter.io work? OSINT refers to the practice of collecting information from publicly available sources, such as the internet, social media, and press releases. This information can be used for a … Read more

Categories Uncategorized