This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here
Slaytec
Pentester, Senior Offensive Security Consultant, Senior Security Researcher
2024 Roadmap to Master Hacker
You want to become a hacker in 2024? What about a Master Hacker? Well... here is a roadmap from one of the best in the business: M...
OSCP vs CPTS
Comparison
Networking for Hackers and Cybersecurity...
How long until you learn something new?
How Hackers can steal a Microsoft 365 Ac...
Session hijacking a Microsoft 365 account! Stealing their credentials and bypassing MFA prompt with Evilginx: a reverse-proxy phis...
CompTIA PenTest+ Full Course - FREE
A complete course CompTIA PenTest+ featuring theory and follow-along labs.
Log4j Vulnerability Cheat Sheet
Log4j Vulnerability
How to use MITRE ATT&CK in SOC
Using MITRE ATT&CK in a Security Operations Center (SOC) can greatly enhance threat detection and response capabilities. Here are ...
How to Apply MITRE ATT&CK to Your Organi...
Discover all the ways MITRE ATT&CK can help you defend your organization. Build your security strategy and policies by making the ...
Critical Security Flaw in Social Login P...
A critical security flaw has been disclosed in miniOrange's Social Login and Register plugin for WordPress that could enable a mal...
MITRE Unveils Top 25 Most Dangerous Soft...
MITRE has released its annual list of the Top 25 "most dangerous software weaknesses" for the year 2023. "These weaknesses lead...
How to protect your private network from...
In this video, you’ll find out about how sniffing with twisted pairs works and what danger it poses to your data.
Browser in the Browser (BITB) Phishing T...
As cybersecurity professionals, we constantly educate users to review the URL before interacting with a website. This Browser in t...