Certified Red Team Professional (CRTP) Study Notes & Guide Introduction to Certified Red Team Professional (CRTP)
How a Hacker Hacked TU Eindhoven of Technology University Using Just VPN Credentials The hacking of TU Eindhoven of Technology university began with the hacker acquiring VPN credentials for two university accounts, labeled…
Why I Quit Chasing The Cyber Security Dream In this article, I pull back the curtain on cybersecurity and strip away the polished image many outsiders imagine. It’s not all digital…
HTB Certified Active Directory Pentesting Expert (HTB CAPE) Study Notes & Guide What is HTB Certified Active Directory Pentesting Expert (CAPE)
Chrome Extensions Can Hack You | Cyber Defenders FakeGPT Walkthrough The article explains that Chrome extensions are composed of six main parts: the manifest file, background scripts, content scripts, popup…
How is AI affecting employment & Your Job? Examining its role in cybersecurity and automation. This article explores how artificial intelligence (AI) is transforming the employment landscape, particularly within cybersecurity and…
TryHackMe Networking Secure Protocols Writeup This write-up offers a comprehensive walkthrough of TryHackMe’s “Networking Secure Protocols” room, focusing on securing network…
SOC Case Study | Phishing Analysis | SOC282 In this article, we take on the role of a SOC (Security Operations Center) analyst, analyzing a phishing alert related to a deceptive email…