Metasploit from Scratch
Introduction Metasploit Framework is a penetration testing technology that has new and enhanced capabilities, including automation APIs, evasion modules, and usability enhancements, and provides...
View ArticleInterview with Jason Ross
about Machine Learning, Deep Learning, AI, and more... To spice things up, the author gave us 2 sets of answers: one delivered by him, and one by ChatGPT! It is your job to guess which ones are his...
View ArticleWriting A Simple Ransomware Using Python
Introduction: Ransomware is a program designed to prevent a user or organization from accessing files on their computers. It encrypts the files and demands a ransom for the decryption key; this places...
View ArticleInterview with Jason Ross
about Machine Learning, Deep Learning, AI, and more. To spice things up, the author gave us 2 sets of answers: one delivered by him, and one by ChatGPT... It is your job to guess which ones are his...
View ArticleGetting Offensive with Go
Introduction Creating Reverse Shells and bypassing Anti-Virus (AV) with Golang. Using Golang in security has become very popular over the last few years. In this article, I want to cover several...
View ArticleWhy Using Open Source Resources in App Development is Essential
App development can be a logistical nightmare if you do not know what you are doing, and if you don’t happen to have open source inventory management by your side when embarking on this venture, it’s...
View ArticleWriting A Simple Ransomware Using Python
Introduction: Ransomware is a program designed to prevent a user or organization from accessing files on their computers. It encrypts the files and demands a ransom for the decryption key; this places...
View ArticleDynamic SQLIA Detection with PHP
Introduction We’re going to discuss a dynamic approach to detect an SQL Injection Attack (SQLIA) based on a static pattern matching algorithm. As we know, SQL injection attacks are malicious...
View ArticleThe process of developing tactics with the purpose of preparing for a cyberwar
Who are the cyber military powers today? Cyber military defenses are being developed by most of the developed countries in the world. However, for a country to be a military power, they must develop...
View ArticleNew frontiers, new worlds, new threats
Where are you going?There.What time will you be back?I will be back soon. Mr.Cardoso Image created in midjourney Introduction Since the beginning of human history, the world has been marked by...
View ArticleCyber Counter-Terrorism: Shutdown
Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as the most effective current tool in the fight against terrorism...
View ArticleBitcoin Account Hijacking Using OSINT Techniques
Researchers at Kudelski Security have managed to break Bitcoin and Ethereum wallets using a novel attack against one of the most popular asymmetric key algorithms of modern cryptography. Although...
View ArticleEmail Delivery: How to Break All the Rules of Zero Trust
92% of malware spread through the email system. This is not a surprise if we consider that the email delivery system breaks almost all the rules defined in Zero Trust. Even though there are several...
View ArticleA.I.-driven shields design for cyber warriors.
Since more private data is stored and transmitted digitally, cybersecurity has emerged as a pressing concern in the Internet Age. Network intrusions can cause devastating financial losses, damage to...
View ArticleModern Special Forces Of The Future (Air, Land, Sea, Cyber)
The world is becoming more complicated and unpredictable, which means that the world's armed forces need to evolve in order to address the new challenges and threats they face. The development of...
View ArticleSecurity of Privileged Access
Introduction Privileged access refers to the administrative access that allows an individual to access and control sensitive data, systems, and networks. This elevated access can be granted to...
View ArticleInsider Threats: The Hidden Danger Within Your Organization and How to...
In today's digital age, information is power. With the increasing use of technology and the internet in the workplace, organizations are at a greater risk of insider threats than ever before. Insider...
View ArticleImpact of Artificial Intelligence on Cybersecurity
Impact of Artificial Intelligence on Cybersecurity Current advances in Artificial Intelligence (AI) are widely impacting the cybersecurity industry. Companies are increasing budgets for cybersecurity...
View ArticleHashcat: A Beginner's Guide
Disclaimer: This is intended to be used solely for ethical purposes. Please make sure you don't try the below-discussed methods on a live machine without any authorization. At the very end of this...
View ArticleWhen PT in ChatGPT refers to Penetration Testing
Reconnaissance and scanning A word of caution: this article makes considerable use of concepts such as Sarcasm and Irony. If you haven’t previously been exposed to these topics, please search them on...
View Article