Why I Quit Chasing The Cyber Security Dream In this article, I pull back the curtain on cybersecurity and strip away the polished image many outsiders imagine. It’s not all digital…
HTB Certified Active Directory Pentesting Expert (HTB CAPE) Study Notes & Guide What is HTB Certified Active Directory Pentesting Expert (CAPE)
Chrome Extensions Can Hack You | Cyber Defenders FakeGPT Walkthrough The article explains that Chrome extensions are composed of six main parts: the manifest file, background scripts, content scripts, popup…
How is AI affecting employment & Your Job? Examining its role in cybersecurity and automation. This article explores how artificial intelligence (AI) is transforming the employment landscape, particularly within cybersecurity and…
TryHackMe Networking Secure Protocols Writeup This write-up offers a comprehensive walkthrough of TryHackMe’s “Networking Secure Protocols” room, focusing on securing network…
SOC Case Study | Phishing Analysis | SOC282 In this article, we take on the role of a SOC (Security Operations Center) analyst, analyzing a phishing alert related to a deceptive email…
Certified Ethical Hacker Study Notes & Practice Tests Introduction to Certified Ethical Hacker Certification
Hacking WordPress Plugins | TryHackMe Smol Hackers can compromise WordPress sites without knowing admin credentials by exploiting vulnerable plugins. WordPress heavily relies on…
Cryptography Free Course | Cryptography For Cyber Security This article kicks things off by explaining that this isn’t a deep dive or an advanced cryptography course or class. It’s more of a…
Is Your Bank Hacking You? | SpyNote Android Malware Analysis with ANY.RUN This article provides an analysis of the SpyNote Android spyware variant, utilizing the ANY.RUN interactive malware analysis service…