By Abdul Azeez Omar Introduction In this blog, I’ll walk through the reverse engineering process of the malware and the…
AWS vs. Azure: Differences in Attacker Behavior
By: Peter Mastropaolo When I first used a cloud hosting service like Amazon Web Services (AWS), I never realized just…
Django Security and SQL Protections
By Michael Madden Django, the web framework – not Django Unchained (Kind of frustrating when you try and google Django…
Linux Syscall Hooking
By Aaron Gdanski Background: The Linux Kernel is a modular open source kernel that provides the basis for Linux distributions…
The Inner Workings of Microsoft BITS: How it can be Used and Misused
By Enzo DeStephano Introducing the Goal Before I get into the descriptions and solutions, I would first like to describe…
Proxying Traffic with Discord
By Chris Cheney Source code available at: https://github.com/cjc1294/DiscordProxy When dealing with networking at any level, firewalls can be irritating. Sometimes,…
Why Do Some Phishing Emails Bypass SPF, DKIM, And DMARC Standard Security Filters
By Phayvanh Butler Introduction In today’s modern world technology, email has become a widely used means of communication in both…
Identifying DDoS traffic with Neural Networks
By Jarryd Brits Identifying and distinguishing between malicious traffic that may indicate DDoS attacks and benign traffic are becoming…
The Internet Before the Internet: Bulletin Board Systems
By Grant J. Bierly While people today may take the internet for granted and wouldn’t really know what to…
CVE Hunting for Fun, but not Profit.
By Henry Ballentine Are you looking for a personal project to punch up your resume, but can’t stand programming? Or…