Decrypting SSL/TLS traffic with Wireshark [updated 2021]

The internet wasn’t designed to be secure from the start. Many protocols (such as HTTP and DNS) were designed to serve their purpose of conveying information over the network without…

Mitigating MFA bypass attacks: 5 tips for developers

Introduction App developers have enough reasons to integrate multi-factor authentication (MFA) into their offerings. Passwords just don’t do the trick, as they’re vulnerable to brute force and can be stolen…

Hacking communities in the deep web [updated 2021]

The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm’s length; meanwhile today they…

8 of the world’s biggest insider threat security incidents

Introduction If you work in security or are just interested in the general area of cybersecurity you will no doubt have heard of the dreaded insider threat. In the context…

Threat hunting with osquery

Introduction In this article, we take a look at osquery and how it can be used to query the security, reliability and compliance information of systems within your network environment.…