Security Write-ups
Featured Write-ups
Title | Date |
---|---|
From English Teacher to Penetration Tester: My Cybersecurity Journey | Dec 13, 2024 |
The 'I Love You' That Broke the Internet: A Love Letter Turned Cyber Nightmare | Dec 5, 2024 |
How You Can Hack and Take Over a Car in 30 Seconds: Lessons from Sam Curry's Research | Oct 7, 2024 |
Subnetting 101: Simple Guide to IP Addressing | Sep 27, 2024 |
MobSF: Simplifying Mobile App Security Testing | Sep 18, 2024 |
Unmasking USDoD: The Brazilian Hacker Who Shook American Cybersecurity | Aug 24, 2024 |
You're Not as Safe as You Think! The Methods Hackers Use to Access Your Accounts | Aug 21, 2024 |
JWT: Benefits and Security Risks | Aug 11, 2024 |
How Data Breaches Could Land You Your Next Cybersecurity Job | Aug 02, 2024 |
CrowdStrike BSOD Crisis: System Crashes Everywhere and How to Fix it Manually | Jul 19, 2024 |
AT&T Data Breach: Millions Affected | Jul 13, 2024 |
RockYou2024: The Largest Password Leak in History | Jul 7, 2024 |
Nuclei: The Ultimate Guide to Fast and Customizable Vulnerability Scanning | Jun 6, 2024 |
Understanding the CrowdStrike 2024 Global Threat Report | May 24, 2024 |
Incident Response: A Comprehensive Guide for Businesses | May 7, 2024 |
XSS Unpacked: What It Is, How It Works, and How to Stop It | Apr 13, 2024 |
A Visionary's Path: Kenneth Holley | Apr 8, 2024 |
Active Directory Defense: Securing the Heart of Your Network | Mar 17, 2024 |
The Critical Role of Zero Trust in Modern Digital Defense | Mar 7, 2024 |
ISO 27001 Essentials: Protecting Your Digital Assets | Mar 2, 2024 |
The Domino Effect: Strategies to Prevent Supply Chain Cyber Disruptions | Feb 25, 2024 |
Let's Talk Cyber: A Quick Dive into Cybersecurity Podcasts | Feb 16, 2024 |
Frontend Fortification: Encryption Techniques for Enhanced Security | Feb 10, 2024 |
Fortifying the Cloud: Essential Security Measures | Feb 5, 2024 |
Zero-Day Threats: How to Detect and Defend Against the Unknown | Jan 30, 2024 |
Bug Bounty 101: Unveiling the Crucial Role in Cybersecurity | Jan 27, 2024 |
Mitigating Backend Security Risks with DevSecOps | Jan 20, 2024 |
Frontend'i Güvenli Hale Getirme: Geliştiriciler İçin Pratik Bir Rehber | Jan 14, 2024 |
SQLMap: Essentials of Ethical SQL Injection Testing | Jan 9, 2024 |
Understanding Metasploit: A Tool for Security Enhancement | Jan 5, 2024 |
Pentesting 101: A Beginner's Guide to Ethical Hacking | Dec 27, 2023 |
Securing the Frontend: A Practical Guide for Developers | Dec 3, 2023 |
OSI Model Basics: Simplified Networking Layer Insights | Nov 28, 2023 |
Snort Setup 101: From Installation to Rule Mastery | Nov 22, 2023 |
Strings and Shields: YARA in Cybersecurity | Nov 17, 2023 |
Navigating Network Security: Building a Python Port Scanner | Nov 13, 2023 |
Mastering Password Security: A Comprehensive Guide | Nov 10, 2023 |
Nmap: Your Swiss Army Knife for Network Reconnaissance | Nov 7, 2023 |
Hunting the Hunters: How Threat Hunting Enhances Cybersecurity | Nov 2, 2023 |
Strengthening Your Online Security with Two-Factor Authentication | Oct 30, 2023 |
From Infiltration to Exfiltration: Exploring the Cyber Kill Chain | Oct 21, 2023 |
Network Protocols: A Comprehensive Guide | Oct 16, 2023 |
Fortifying Cybersecurity with AI and Machine Learning | Aug 28, 2023 |
5 Essential Tips for Securing Your Personal Devices | Aug 17, 2023 |
Unleashing the Power of pfSense | Aug 12, 2023 |
From Awareness to Resilience: Exploring Threat Intelligence | Aug 2, 2023 |
Unraveling the World of Malware | Jul 31, 2023 |