CyberNews

Debugging your first x86 program

Debugging the compiled programs is one important aspect of learning x86 assembly language. When working with assembly programs, the only way to step through every single instruction written in the

Read More »

J3rryBl4nks’s PEN-300 Approach

Guest post by J3rryBl4nks, OffSec student and OSCP holder My PEN-300 Approach My name is J3rryBl4nks. I have been in roles in information technology for 17 years. I started out

Read More »

Email forensics: desktop-based clients

Emails are the most commonly used technology for exchanging messages between people/businesses using electronic media. With every technology, there comes a risk. This medium of message exchange has been used

Read More »

What is a Honey Pot? [updated 2021]

Introduction: What is a Honeypot? Honeypots are special programs that are written for one purpose: to be exploited. Honeypots emulate the appearance of a vulnerability so that attackers, viruses and

Read More »

Email forensics: Web-based clients

This article discusses how to perform forensic investigations of Web-based email clients. While many organizations use Desktop based email clients for their employees, it is not uncommon to use web

Read More »

Email analysis

In this article, we will explore the fundamentals concepts associated with email that will help us to perform email analysis. We will begin by understanding the email structure and discuss

Read More »

Investigating wireless attacks

In an earlier article, we discussed the fundamentals of wireless networks: the common types of wireless devices, terminology used, WLAN security types, 802.11 frame types and wireless traffic analysis using

Read More »

What are smart contracts?

What are Smart Contracts Let’s understand what Smart Contracts are using a simple example. Consider the purchase of cookies from a vending machine. The one who wants to buy the

Read More »

OffSec 2020 Recap

2020 has been quite a year, hasn’t it? It’s been challenging in so many ways, but it was also exciting for us at OffSec. We thrive on bringing new training

Read More »

OffSec 2020 Recap

2020 has been quite a year, hasn’t it? It’s been challenging in so many ways, but it was also exciting for us at OffSec. We thrive on bringing new training

Read More »

The Future of Cloud Security

Trend Micro – Lockdown has accelerated the use of cloud technologies throughout the business world, and it looks like there’s no going back. Mark Nunnikhoven, VP of Cloud Research at

Read More »

Beat Cybercriminals at Their Own Game

Trend Micro – According to Gartner, vulnerability exploitation is the cause of most information security breaches, and any breach can harm your business, diminish customer trust, impact revenue, and depress

Read More »

Advanced cryptography in blockchain

Blockchain is Built with Cryptography Blockchain technology is revolutionary.  It provides a completely different way of accomplishing a wide range of tasks, which has led to its widespread adoption. However,

Read More »