Security Concepts
ChatGPT for Offensive Security: Five Attacks
ChatGPT is an AI chatbot that uses Natural Language Processing (NLP) combined with the GPT-3 framework to provide human-like responses. NLP allows the model to… ...
Understanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain
In May 2021, the US government signed an Executive Order mandating that software suppliers selling to the government must include a Software Bill of Material… ...
The CISO Perspective 2023-02-20 09:19:54
At one point, virtual private networks (VPNs) were a valuable tool for remote workers to access private networks and data centers. But with more and… ...
What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology… ...
Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work
How Exploits Work In cybersecurity, the term “exploit” is used to represent a piece of code, data or sequence of commands that takes advantage of… The post Exploits Explained: How Log4j, Buffer ...
Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA
Hacking 2FA and MFA When MFA is implemented correctly, it can be an extremely powerful and low-cost way to protect against the weakest link in… The post Hacking Two Factor Authentication: Four ...
What is Open-Source Intelligence (OSINT)?
What is OSINT? In “Breaking the Kill Chain: A Defensive Approach,” we took a look at the seven steps an attacker generally goes through in… The post What is Open-Source Intelligence (OSINT)? ...
Active Reconnaissance: Overview, Methodology and Tools
Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,… The post Active Reconnaissance: Overview, Methodology and ...
Mobile Devices on the LAN
iPhone Hype, get your iPhone hype here!Those handsome, intelligent and engaging folks over at Astaro Internet Security have just introduced a very easy IPSec client auto-setup for an iPhone to connect to ...