Cloud Security in 2025: Eight Critical Shifts Reshaping the Cybersecurity Landscape2025 is not the year to play catch-up. Brace yourself if you’re still handling cloud security as if it were an outdated firewall…4d ago4d ago
Deepfake Malware: An Unseen Cyber Enemy?The world of tech is growing, and it’s growing FAST. Just blink, and you’ll miss some new invention changing how we work, live, and, yes……Oct 7, 2024Oct 7, 2024
Inside My Cybersecurity Penetration StrategyPrinciples of Effective Penetration TestingJan 12, 2024Jan 12, 2024
HTB — Sauna(Write UP)Sauna is an easy-level Windows machine emphasizing Active Directory enumeration and exploitation. Usernames can be inferred from employee…Jan 10, 2024Jan 10, 2024
OFFSEC: PlanetExpress — Proving Grounds PracticePlanetExpress is a Linux machine with Easy difficulty. It is part of the Proving Grounds Practice. This machine is designed to test your…Jan 8, 2024Jan 8, 2024
OFFSEC: Resourced — Proving Grounds Practice (Writeup)“Resourced” operates as a machine within a Windows Active Directory (AD) environment. The initial access strategy involved utilizing an…Jan 7, 2024Jan 7, 2024
OFFSEC: Vault — Proving Grounds Practice(Writeup)“Vault” operates as a Windows-based system within an Active Directory environment. The initial foothold strategy involves two key actions…Jan 6, 20241Jan 6, 20241