My review of Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker, is Kevin Mitnick’s autobiography.
My review of “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency”. TLDR: Its a must-read.
Learn how to build obfuscated Bash backdoors with some help from ChatGPT. Can Hackers use ChatGPT to build them the Bash malware they need? Find out in this blog post.
Protect your data from cybersecurity incidents like ransomware, hardware failures, or natural disasters with a 3-2-1 Backup Strategy.
How you can protect your Windows Servers from 2FA bypass and Pass-the-Hash Attacks. Your Yubikeys or Duo Authentication cannot fully protect you! Secure the WinRM service now!
How you can leverage built-in Windows OS tools to bypass Two-Factor Authentication. Bypass Yubikeys and Duo 2FA! Red Team TTPs!
Help defend the Internet! Join a community of security researchers gathering logs and running honeypots to mitigate online attacks.
LetsDefend’s DFIR challenge “Infection with Cobalt Strike” walk-through!
A Walk-Through of the LetsDefend’s DFIR Ransomware Attack Challenge!
How to start training to become an Incident Responder, SOC Analyst, or Blue Team member. Learn malware analyst with free online tools.