An investigation by Fortinet has uncovered a post-exploitation technique used by a threat actor. During this investigation, a threat actor…
So I have an idea for a project. The idea is to document the core concepts taught in the major…
Identity security company CyberArk has released a first-of-its-kind machine identity security solution, the Secure Workload Access Solution. The company says…
So I finally accomplished something with the site I’ve been wanting to do for a couple of months now–my “Discovered…
The Hong Kong Monetary Authority (HKMA) will announce on Monday new measures to be implemented by banks to safeguard the…
I think my argument for feel vs. features has been thoroughly supported over the last few years of iPhone success….
Laura Chappell just posted a great tutorial on getting GeoIP working with the new version of Wireshark (1.2). I set…
What follows is a primer on the key security-oriented characteristics of the HTTP protocol. It’s a collection of a number…
As of the last year or so my preferred method for installing and updating nmap is to use subversion. It’s…
Initiatives like the Top Talent Pass Scheme (TTPS) by the Hong Kong Government is making it easier for international talent…
The highest form of human awareness comes through a number of realizations and stages of acceptance regarding the nature of…
In a scenario where your SMB or enterprise gets constantly bombarded (portscans, brute force, spam, etc.) by Russia, China, Brazil,…











