DevSecOps: bringing security into your DevOps practice on Azure

DevSecOps: bringing security into your DevOps practice on Azure

Victoria Almazova joins David Blank-Edelman to discuss DevSecOps practices on Azure - what it is, why it's so important, and how you can implement DevSecOps... Details
Hacking Computers from Blocks Away With a Wi-Fi Duck

Hacking Computers from Blocks Away With a Wi-Fi Duck

The USB Rubber Ducky is a famous hacker tool that allows quick exploitation of a target computer, provided you know what script you want to... Details
A Shocking 3.27 Billion Passwords Are on Sale for Song

A Shocking 3.27 Billion Passwords Are on Sale for Song

Another day, another hack. Seytonic covers the latest shocking breash and how to protect yourself. Details
Touring a Hacker Van

Touring a Hacker Van

Hak5’s Glytch gives a tour with this tour his home and workshop on the road. This will make you wonder about that windowless van down... Details
Why Did He Hack His Own Car?

Why Did He Hack His Own Car?

Steve Mould hacked his own car to demonstrate how vulnerable we are. Details
PWNing WiFi With AI

PWNing WiFi With AI

It was only a matter of time before the world of AI, IoT, and cybersecurity would collide into a small portable device. Seytonic explores what... Details
Did Lockdowns Cause A Spike in DDoS Attacks?

Did Lockdowns Cause A Spike in DDoS Attacks?

Another unintended consequence of the pandemic lockdowns.  Details
Basics of SQL Injection – Penetration Testing for Ethical Hackers

Basics of SQL Injection – Penetration Testing for Ethical Hackers

In case you’re wondering why I am posting a lot of security related content today, the reason is simple: it impacts everyone. If you’re a... Details
Linux for Ethical Hackers

Linux for Ethical Hackers

freeCodeCamp.org provides this free course, where you will learn the basics of Kali Linux. The course covers installation, using the terminal / command line, bash... Details
Malware Using BSSID for Geolocation

Malware Using BSSID for Geolocation

AT&T Tech Channel highlights a new malware technique. Malware operators find location of victims they infect with a simple technique. Stan Nurilov, Michael Klepper and... Details