Secure Coding: Building Software That Can Survive Attacks
A practical guide for developers and security practitioners on secure coding principles, common vulnerabilities, prevention techniques, and real-world code examples.
A practical guide for developers and security practitioners on secure coding principles, common vulnerabilities, prevention techniques, and real-world code examples.
Understanding passive intelligence gathering, its legal implications, methodologies, tools, and practical examples.
A complete prebuilt multi-host cybersecurity practice environment using Docker Compose, featuring Kali, DVWA, Juice Shop, Metasploitable 2, internal services, and optional macvlan LAN emulation.
Guide for cybersecurity practitioners to emulate networks, devices, and services locally using Docker.
Hands-on guide to building a Python-based scanner that parses help output from Azure CLI (az), AWS CLI (aws), gcloud, and kubectl to flag potentially abusive subcommands for red team and blue team use.
How attackers abuse cloud CLI tools like azure.exe, aws.exe, gcloud, and kubectl for persistence, lateral movement, and data exfiltration — with real-world code samples.
A practical guide for older adults on identifying and avoiding the most common online, text, and phone scams to protect their personal and financial security.
An overview of business continuity planning and how security engineers contribute to ensuring organizational resilience.
A deep-dive into Living Off the Land Binaries (LOLBins), how attackers abuse legitimate Windows utilities, real-world examples, and a safe lab demonstration with PowerShell and certutil.exe.
A clear explanation for older adults on why and how to enable Multi-Factor Authentication (MFA/2FA) to add a critical extra layer of security to their online accounts.