In the age of information technology, when the Internet has already become an integral part of the life of a modern person, the issue of personal security on the...
In the age of information technology development for many people, mobile devices have become the main means of communication, entertainment and information storage. Modern smartphones are now not inferior in...
Cyberattacks are a 21st century internet pandemic. Every day, despite the wide availability of information on the types of attacks and prevention, including phishing cyberattacks, a huge number of people...
OSINT is a technology for searching, accumulating and analyzing data collected from available sources on the Internet. It sounds too general, so we will try to reveal the essence of...
When configuring a new security system, you must ensure that it works as expected and has as few vulnerabilities as possible. Where thousands of dollars in digital assets are involved,...
How to become a pentester from scratch, and in general, what does penetration testing include? What tools should you master and in what sequence? Pentesting – what you need to...
We’ve prepared a two-part translation of Ryan Sears’s article on handling Google’s Certificate Transparency logs . The first part gives an overview of the structure of the logs and provides a sample Python code for...
Three years ago we published an article “ Online tools for the simplest Pentest ”. There we talked about affordable and quick ways to check the protection of your network perimeter using...
The year was 2020, people were delighted to read another article about how bad it is to open letters from strangers, especially with attachments, how dangerous it is to...
This article will review team interaction, tools and methodologies for conducting Red Team operations. The operations of the Red Team allow simulating the attack of a group of professional external...
