Security Write-ups

Featured Write-ups

TitleDate
From English Teacher to Penetration Tester: My Cybersecurity Journey
Dec 13, 2024
The 'I Love You' That Broke the Internet: A Love Letter Turned Cyber Nightmare
Dec 5, 2024
How You Can Hack and Take Over a Car in 30 Seconds: Lessons from Sam Curry's Research
Oct 7, 2024
Subnetting 101: Simple Guide to IP Addressing
Sep 27, 2024
MobSF: Simplifying Mobile App Security Testing
Sep 18, 2024
Unmasking USDoD: The Brazilian Hacker Who Shook American Cybersecurity
Aug 24, 2024
You're Not as Safe as You Think! The Methods Hackers Use to Access Your Accounts
Aug 21, 2024
JWT: Benefits and Security Risks
Aug 11, 2024
How Data Breaches Could Land You Your Next Cybersecurity Job
Aug 02, 2024
CrowdStrike BSOD Crisis: System Crashes Everywhere and How to Fix it Manually
Jul 19, 2024
AT&T Data Breach: Millions Affected
Jul 13, 2024
RockYou2024: The Largest Password Leak in History
Jul 7, 2024
Nuclei: The Ultimate Guide to Fast and Customizable Vulnerability Scanning
Jun 6, 2024
Understanding the CrowdStrike 2024 Global Threat Report
May 24, 2024
Incident Response: A Comprehensive Guide for Businesses
May 7, 2024
XSS Unpacked: What It Is, How It Works, and How to Stop It
Apr 13, 2024
A Visionary's Path: Kenneth Holley
Apr 8, 2024
Active Directory Defense: Securing the Heart of Your Network
Mar 17, 2024
The Critical Role of Zero Trust in Modern Digital Defense
Mar 7, 2024
ISO 27001 Essentials: Protecting Your Digital Assets
Mar 2, 2024
The Domino Effect: Strategies to Prevent Supply Chain Cyber Disruptions
Feb 25, 2024
Let's Talk Cyber: A Quick Dive into Cybersecurity Podcasts
Feb 16, 2024
Frontend Fortification: Encryption Techniques for Enhanced Security
Feb 10, 2024
Fortifying the Cloud: Essential Security Measures
Feb 5, 2024
Zero-Day Threats: How to Detect and Defend Against the Unknown
Jan 30, 2024
Bug Bounty 101: Unveiling the Crucial Role in Cybersecurity
Jan 27, 2024
Mitigating Backend Security Risks with DevSecOps
Jan 20, 2024
Frontend'i Güvenli Hale Getirme: Geliştiriciler İçin Pratik Bir Rehber
Jan 14, 2024
SQLMap: Essentials of Ethical SQL Injection Testing
Jan 9, 2024
Understanding Metasploit: A Tool for Security Enhancement
Jan 5, 2024
Pentesting 101: A Beginner's Guide to Ethical Hacking
Dec 27, 2023
Securing the Frontend: A Practical Guide for Developers
Dec 3, 2023
OSI Model Basics: Simplified Networking Layer Insights
Nov 28, 2023
Snort Setup 101: From Installation to Rule Mastery
Nov 22, 2023
Strings and Shields: YARA in Cybersecurity
Nov 17, 2023
Navigating Network Security: Building a Python Port Scanner
Nov 13, 2023
Mastering Password Security: A Comprehensive Guide
Nov 10, 2023
Nmap: Your Swiss Army Knife for Network Reconnaissance
Nov 7, 2023
Hunting the Hunters: How Threat Hunting Enhances Cybersecurity
Nov 2, 2023
Strengthening Your Online Security with Two-Factor Authentication
Oct 30, 2023
From Infiltration to Exfiltration: Exploring the Cyber Kill Chain
Oct 21, 2023
Network Protocols: A Comprehensive Guide
Oct 16, 2023
Fortifying Cybersecurity with AI and Machine Learning
Aug 28, 2023
5 Essential Tips for Securing Your Personal Devices
Aug 17, 2023
Unleashing the Power of pfSense
Aug 12, 2023
From Awareness to Resilience: Exploring Threat Intelligence
Aug 2, 2023
Unraveling the World of Malware
Jul 31, 2023