Cybersecurity in Education: What Parents, Teachers, and Students Should Know in 2023
Cybersecurity in Education: What Parents, Teachers, and Students Should Know in 2023 In as much as we have to thank …
Read MoreRemembering Leonard Jacobs
We are deeply saddened by the passing of our course instructor and author, Leonard Jacobs. Leonard was a great professional, …
Read MoreVPN Security: A Pentester's Guide to VPN Vulnerabilities
VPN Security: A Pentester's Guide to VPN Vulnerabilities by Gilad David Maayan What Is a VPN? A virtual private network …
Read MoreAppSec Tales II | Sign-in
AppSec Tales II | Sign-in by Karol Mazurek Application Security Testing of the Login form guidelines. INTRODUCTION This is the …
Read MoreString Anti-virus Evasion in x64 Assembly (Part 2)
String Anti-virus Evasion in x64 Assembly (Part 2) by Karlo L In my last blog post, I discussed a way to …
Read MoreAppSec Tales I | Sign-up
AppSec Tales I | Sign-up by Karol Mazurek Application Security Testing of the Register form guidelines. INTRODUCTION This is the …
Read MoreThe Choking effect of Promises and Async-await on your existing Callbacks
The Choking effect of Promises and Async-await on your existing Callbacks by Jaimandeep Singh Your Promise and Async-await may inadvertently …
Read MoreConverting a Malware Dropper to x64 Assembly
Converting a Malware Dropper to x64 Assembly by Karlo L In this post I'll be listing down lessons I learned …
Read MoreWhy Cybersecurity Consultants Are In High Demand
Why Cybersecurity Consultants Are In High Demand A cybersecurity consultant is responsible for identifying vulnerabilities and implementing security measures to …
Read More9 New Cyber Threats and How to Successfully Avoid Them
9 New Cyber Threats and How to Successfully Avoid Them The digital world is vast and seems endless because, at …
Read More