Blog

Cryptography for kids – Who wants to be a spy?

Let’s be honest, who didn’t want to be James Bond when they were younger? There’s nothing cooler[…]

RSS feed to Discord

Keeping up with all the InfoSec news is difficult with so many sources of information. Collecting these[…]

Finding potential subdomain takeovers with dnsReaper

In the previous post we looked at finding DNS records and subdomains. With that information, it’s time[…]

Massive MOVEit leaks: Possibly 1000+ companies get their data leaked

Back in May 2023, MOVEit was the victim of a Russian based ransomware group called Cl0p. This[…]

Finding subdomains & Dangling DNS records

Finding subdomains is a part of the reconnaissance process for security researchers and bad actors. They want[…]

Cryptography: Understanding the SOE code used in WW2

This is one of the longer (or even longest) posts you will find here. It’s because the[…]

What is a CVE?

Tracking vulnerabilities can be difficult. This is one of the reasons why the CVE (Common Vulnerabilities and[…]

What is CVSS, the vulnerability scoring system?

Everybody that is reading the news will see articles about data breaches and hacks. It almost seems[…]

Understanding OWASP and why it’s important

If you’ve spent any time in the world of web development, you’ve probably heard of OWASP. Maybe[…]

Why you should have a Responsible Disclosure policy & Security.txt

A responsible disclosure is a process that allows security researchers or ethical hackers to report discovered vulnerabilities[…]