Filter by author:
Filter by tag:
Filter by title:
Watch out for keylogging/keyloggers
Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.
There's not an only way but here's a good one
We offer a guide to become an ethical hacker based off some information on common non-technical and technical skills hackers find useful for their role.
Benefits and risks of these increasingly used programs
We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.
A hacker's view of the performance of Researcher CNAs
We've been a CNA for a while, and this is an analysis of our performance.
Why so many are switching to Rust
Memory-related security issues are common and often critical. To reduce their presence, ongoing projects are writing in memory-safe languages like Rust.
Description and critique of CEH certifications
Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"
An OffSec Experienced Pentester review
In this post, we review the PEN-300 course and OSEP certification offered by OffSec.
Or what makes the ethical hacker
If ethical hackers can do everything cybercriminals do, what is keeping them from wrongdoing? Let's see how they differ and how that shows in codes of ethics.
Recognize the value of this security assessment method
We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.