Among exposed were secrets, code and AI training data
We describe the leak and mention its causes and threats, talk about the possible security risks when using Azure SAS tokens and give advice to prevent leaks.
An OffSec Exploitation Expert review
In this post, we review the EXP-401 course and OSEE certification offered by OffSec.
An interview with members of our hacking team
Members of our hacking team who took part in the International Cybersecurity Challenge tell us what the hardest part was, their recommendations, and more.
A brief overview of this recent EU draft regulation
Learn about the draft Cyber Resilience Act, including its purposes, obligations and penalties, before its final version comes.
Increase the board's cyber savvy with these reads
Boards need to gain skills to identify, assess and supervise their organizations' cyber risk-management measures. We share resources to help them on their way.
Soon it will be a must in cybersecurity due to NIS2
We briefly introduce the NIS 2 Directive and pay special attention to its cybersecurity training requirement for organizations' boards of directors.
Toyota's ancient and recently disclosed data leaks
We describe the data leaks recently disclosed by Toyota Motor Corporation lasting five, eight and ten years.
Watch out for keylogging/keyloggers
Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.
There's not an only way but here's a good one
We offer a guide to become an ethical hacker based off some information on common non-technical and technical skills hackers find useful for their role.