Blog

Flipper Zero: Firmware 1.0 is here!

In August of 2020, the Flipper Zero first appeared as a Kickstarter campaign. It was marketed as[…]

Why should RPO & RTO matter to you?

In the world of IT and data management, two acronyms often pop up: RPO (Recovery Point Objective)[…]

What is the CIA Triad?

In Cybersecurity (or InfoSec), a fundamental concept known as the CIA triad stands out as a cornerstone[…]

Surface web, Deep web, Dark web and TOR: How does it work?

The Internet is a complex network with multiple layers, each serving different purposes. The two most heard[…]

Should I use a VPN?

Every cybersecurity professional gets this question more often than they are willing to admit. So why don’t[…]

OSINT: Using Google Dorks to find the unfindable

Google Dorks, also known as Google hacking, is a technique that uses advanced search operators to find[…]

Evilginx: Advanced phishing

In the previous post we looked at setting up Evilginx to work locally. Now we can look[…]

Evilginx: Phishing made easy

Everybody knows what phishing is of course. Cybercriminals try to trick individuals into giving away their sensitive[…]

Steganography: The Art of Hidden Messages

Steganography, an ancient technique adapted for the digital era, is the craft of hiding information in plain[…]

Flipper Zero: Capturing and Cracking WiFi passwords

In a previous post you’ve seen how easy it is to flash Marauder on the Flipper Zero[…]