INFOSECThe CIA TriadThe CIA Triad and the AAA’s sound like gangs of criminals, but are in fact essential cybersecurity tools.
INFOSECWe Are All Hacktivists NowOur adversaries allow cyber crime groups to operate within their borders, while we demonize our hacker communities.
INFOSECLegality & The IT Army Of UkraineHundreds of thousands of infosec professionals signed up for cyberwar without realizing it might make them cyber combatants.
CYBERSECMicrosoft Needs To Stop Providing Security To RussiaMicrosoft needs to stop directly supporting the cybersecurity efforts of the Russian government.
INFOSECDeTy: A Website For The Missing People Of UkraineDe Ty? Де Ти? Where Are You? Volunteers from the infosec space built a website for the missing people of Ukraine.
CYBERSECAdvice for UkrainiansCyber warfare is not to be taken lightly especially for the Ukrainians! A good samaritan security researcher gives valuable advice to the Ukranian people on how they can stay safe on the internet!
INFOSECSecjuice Squeeze 77Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICALHTB Horizontall WalkthroughAnother Hack The Box walkthrough, but this time Andy From Italy explains how we can exploit the Horizontall machine with Laravel and remote code execution!
INFOSECSecurity Should Start with the Involvement of Top ManagementSecurity researcher Alesanco explains why top management in an organization plays an important role in security, and how an organization can secure its assets by assessing risks and having a Business Continuity Plan (BCP) in place... and much much more.
INFOSECLog4Shell Explained to Your Non-Technical FriendSecurity researcher Andrea Barracu explains how the Log4Shell vulnerability works in a digestible manner for those who are non-technical and still want to grasp an understanding of it.
INFOSECThreat Intelligence: Intelligence RequirementIntelligence requirement (IR) is an important component of threat intelligence. Some of us don't know what it is or how to do IR. Find out what questions to ask to help you perform IR as told by Luca Ziesler.
INFOSECSecjuice Squeeze 76Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICALHTB Forge WalkthroughAndy From Italy uncovers how he escalated privileges, gained secret passwords, utilized the pdb Python debugger - and much more - with another incredible Hack The Box walkthrough!
INFOSECSecjuice Squeeze 75Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICALHTB Previse WalkthroughAndy From Italy gives us a fantastic HTB walkthrough exploiting the mySQL database on the Previse BOX!
INFOSECSecjuice 2021 Writer of the Year Winner: Andy From ItalyThe 2021 Secjuice Writer of the Year award goes to our Hack The Box write-up legend, the one and only–Andy From Italy!
TECHNICALTryHackMe Mr. Robot CTF WriteupGurkirat Singh publishes his final write-up for 2021 on the TryHackMe Mr. Robot CTF, and demonstrates how to get root access into the Mr. Robot room and more!
INFOSECOn Writing BetterRoss Moore provides us an excellent guide filled with timeless advice on how to write better for infosec (and in general too), even if English isn't your first language!
TECHNICALTryHackMe Bounty Hacker Write-upGurkirat Singh pushes out another one of his final TryHackMe write-ups for the year 2021 based on the room called Bounty Hacker! He shares how you can exploit the sudo misconfiguration when there's a password reusable vulnerability in the system and more!
TECHNICALHTB Writer WalkthroughSecjuice Writer of the Year 2021, Andy From Italy, writes up the final HTB walkthrough of the year on the Linux-based BOX titled Write (which we find so cleverly appropriate and fitting).
INFOSECApplying the OODA Loop Model for Time-Sensitive Decision MakingMars Groves explains the four steps of the OODA Loop model used in intelligence for decision-making, which is very useful for difficult and time-sensitive situations.
INFOSECAgainst Child PornographyChild pornography awareness is crucial to society and hardly spoken about. Alesanco stands against child exploitation and shares important methods on how we can protect children from the dangerous threats of real life monsters.
TECHNICALTryHackMe Road Challenge WalkthroughA detailed walkthrough on Linux privilege escalation with the TryHackMe web-to-root machine named Road.
TECHNICALHTB BountyHunter WalkthroughA technical walkthrough of the HackTheBox BountyHunter challenge!
TECHNICALTryHackMe Writeup: HackParkA technical writeup of the TryHackMe room HackPark reveals methods of system exploitation and gaining root privileges!