1. Basic Terminology
APT is an acronym for Advanced Persistent Threat. This can be considered a team/group (threat group), or even country (nation-state group), that engages in long-term a...
🔒 RSA is Strong... Until It’s Not 🔓
Let’s be real RSA-2048 encryption is everywhere. Your bank transactions, crypto wallets, VPNs, software licenses, all rely on it. It’s been the...
Sometimes in my daily work, I need to handle certificates and double-check their details. Questions like, "Is this a new or old certificate? Does it have the SAN I need?" often come up.Recently, I dec...
🛡️ Ethical Hacking vs Black Hat Hacking – What’s the Difference?
In today’s digital world, the term "hacking" often brings to mind cybercrime, data theft, and malware. But did you ...
Before we start let's understand a few keywords
Vulnerability: Vulnerability is always defined by the ISO 27002 and VM is a weakness of an asset or group of assets that can be exploited by 1 or more ...
Flag 1
Once entering the room, we are greeted with an email as follows.Objective:
- Scan the file
- Block itSo with that said, just submit it for analysis by clicking on the file, the...
1. Cyber Threat Intelligence
Cyber Threat Intelligence (CTI) can be defined as evidence-based knowledge about adversaries, including their indicators, tactics, motivations, and actionable adv...
Overview
As a student currently enrolled in a Computer Science degree with little prior cybersecurity knowledge, I wanted to explore ethical hacking but was unsure where to start. The TryHack...
Overview
As a Computer Science student with little prior cybersecurity knowledge, I wanted to gain a deeper understanding of web application security and ethical hacking. The TryHackMe Web Ap...
Mindgard is the leader in Artificial Intelligence Security Testing. Founded at Lancaster University and backed by cutting edge research, Mindgard enables organizations to secure their AI systems from ...