Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Adiel Lizama 3 days agoData Broker and Privacy DataWhen surfing the Internet, everything we do generates information, from the videos we like, the songs we listen to, the pages we visit,...
Alissa KnightOct 19, 2020All That We Let In: Hacking Mobile Health APIs (Part 1)Introduction Are you being kept up at night wondering just how secure your company's mobile health (mHealth) APIs really are? You aren't...
A. KinghtAug 20, 2020Hacking GSM: Building a Rogue Base Station to Hack Cellular DevicesIntroduction A rogue base station (also called a dirt box or rogue BTS) is the use of a software-defined radio (RTL-SDR) to create a fake...
-Jun 10, 2020BLEvil: How to Hack BLE IoT Devices Using Raspberry PisIntroduction This article is written for penetration testers wanting to learn how to hack Bluetooth low energy (BLE) smart devices using...
-Feb 21, 2020When the bough breaks: The end of the SIEM era and rise of ELKThe story behind the mass exodus of enterprises from SIEM to Elastic "It is not the strongest or the most intelligent who will survive,...
-Jan 22, 2020Memoirs of an API Hacker: Intercepting Encrypted Mobile Traffic to Hack a Bank's API Server“Abashed the devil stood and felt how awful goodness is and saw Virtue in her shape how lovely: and pined his loss” -John Milton In a...
-Nov 7, 2019The Butterfly Effect: The Changing Winds on the SIEM MarketThe butterfly effect, a concept originating in chaos theory, describes how small changes can have a nonlinear impact on a complex system,...