JS-Tap Mark II: Now with C2 Shenanigans
2 days, 17 hours ago |
www.trustedsec.com
Introducing Meta-Detector
4 days, 17 hours ago |
www.trustedsec.com
Most Reported Web Findings of 2023
1 week, 2 days ago |
www.trustedsec.com
XZ Utils Made Me Paranoid
2 weeks, 2 days ago |
www.trustedsec.com
From Chaos to Clarity: Organizing Data With Structured Formats
1 month, 3 weeks ago |
www.trustedsec.com
From Error to Entry: Cracking the Code of Password-Spraying Tools
1 month, 4 weeks ago |
www.trustedsec.com
Weaponization of Token Theft – A Red Team Perspective
2 months, 3 weeks ago |
www.trustedsec.com
MailItemsAccessed Woes: M365 Investigation Challenges
2 months, 3 weeks ago |
www.trustedsec.com
CMMC NOPE: Why You Don’t Need to be CMMC Compliant
2 months, 4 weeks ago |
www.trustedsec.com
CMMC NOPE: Why You Don’t Need to be CMMC Compliant
2 months, 4 weeks ago |
www.trustedsec.com
The Rising Threat: A Surge in Zero-Day Exploits
3 months, 2 weeks ago |
www.trustedsec.com
Burrowing a Hollow in a DLL to Hide
3 months, 2 weeks ago |
www.trustedsec.com
From Zero to Purple
3 months, 3 weeks ago |
www.trustedsec.com
ProxyHelper2: The Sequel
3 months, 3 weeks ago |
www.trustedsec.com
Detection Alchemy - The Purple Team Way
4 months, 1 week ago |
www.trustedsec.com
Regex Cheat Sheet
4 months, 3 weeks ago |
www.trustedsec.com
What is Hackvertor (and why should I care)?
5 months, 2 weeks ago |
www.trustedsec.com
Clickjacking: Not Just for the Clicks
6 months ago |
www.trustedsec.com
The Triforce of Initial Access
6 months, 1 week ago |
www.trustedsec.com
JS-Tap: Weaponizing JavaScript for Red Teams
6 months, 2 weeks ago |
www.trustedsec.com
A Hitch-hacker's Guide to DACL-Based Detections (Part 1A)
7 months, 1 week ago |
www.trustedsec.com
Basic Authentication Versus CSRF
7 months, 3 weeks ago |
www.trustedsec.com
Basic Authentication Versus CSRF
7 months, 3 weeks ago |
www.trustedsec.com
Creative Process Enumeration
8 months, 1 week ago |
www.trustedsec.com
Creative Process Enumeration
8 months, 1 week ago |
www.trustedsec.com
Crafting Emails with HTML Injection
8 months, 2 weeks ago |
www.trustedsec.com
Crafting Emails with HTML Injection
8 months, 2 weeks ago |
www.trustedsec.com
Prefetch: The Little Snitch That Tells on You
9 months, 3 weeks ago |
www.trustedsec.com
Prefetch: The Little Snitch That Tells on You
9 months, 3 weeks ago |
www.trustedsec.com
Modeling Malicious Code: Hacking in 3D
10 months ago |
www.trustedsec.com
Nothing found.
Items published with this topic over the last 90 days.
Latest
JS-Tap Mark II: Now with C2 Shenanigans
2 days, 17 hours ago |
www.trustedsec.com
Introducing Meta-Detector
4 days, 17 hours ago |
www.trustedsec.com
Most Reported Web Findings of 2023
1 week, 2 days ago |
www.trustedsec.com
XZ Utils Made Me Paranoid
2 weeks, 2 days ago |
www.trustedsec.com
From Chaos to Clarity: Organizing Data With Structured Formats
1 month, 3 weeks ago |
www.trustedsec.com
From Error to Entry: Cracking the Code of Password-Spraying Tools
1 month, 4 weeks ago |
www.trustedsec.com
Weaponization of Token Theft – A Red Team Perspective
2 months, 3 weeks ago |
www.trustedsec.com
MailItemsAccessed Woes: M365 Investigation Challenges
2 months, 3 weeks ago |
www.trustedsec.com
CMMC NOPE: Why You Don’t Need to be CMMC Compliant
2 months, 4 weeks ago |
www.trustedsec.com
CMMC NOPE: Why You Don’t Need to be CMMC Compliant
2 months, 4 weeks ago |
www.trustedsec.com
The Rising Threat: A Surge in Zero-Day Exploits
3 months, 2 weeks ago |
www.trustedsec.com
Burrowing a Hollow in a DLL to Hide
3 months, 2 weeks ago |
www.trustedsec.com
From Zero to Purple
3 months, 3 weeks ago |
www.trustedsec.com
ProxyHelper2: The Sequel
3 months, 3 weeks ago |
www.trustedsec.com
Detection Alchemy - The Purple Team Way
4 months, 1 week ago |
www.trustedsec.com
Regex Cheat Sheet
4 months, 3 weeks ago |
www.trustedsec.com
What is Hackvertor (and why should I care)?
5 months, 2 weeks ago |
www.trustedsec.com
Clickjacking: Not Just for the Clicks
6 months ago |
www.trustedsec.com
The Triforce of Initial Access
6 months, 1 week ago |
www.trustedsec.com
JS-Tap: Weaponizing JavaScript for Red Teams
6 months, 2 weeks ago |
www.trustedsec.com
A Hitch-hacker's Guide to DACL-Based Detections (Part 1A)
7 months, 1 week ago |
www.trustedsec.com
Basic Authentication Versus CSRF
7 months, 3 weeks ago |
www.trustedsec.com
Basic Authentication Versus CSRF
7 months, 3 weeks ago |
www.trustedsec.com
Creative Process Enumeration
8 months, 1 week ago |
www.trustedsec.com
Creative Process Enumeration
8 months, 1 week ago |
www.trustedsec.com
Crafting Emails with HTML Injection
8 months, 2 weeks ago |
www.trustedsec.com
Crafting Emails with HTML Injection
8 months, 2 weeks ago |
www.trustedsec.com
Prefetch: The Little Snitch That Tells on You
9 months, 3 weeks ago |
www.trustedsec.com
Prefetch: The Little Snitch That Tells on You
9 months, 3 weeks ago |
www.trustedsec.com
Modeling Malicious Code: Hacking in 3D
10 months ago |
www.trustedsec.com
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Security Operations Manager-West Coast
@ The Walt Disney Company | USA - CA - 2500 Broadway Street
Vulnerability Analyst - Remote (WFH)
@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US
Senior Mainframe Security Administrator
@ Danske Bank | Copenhagen V, Denmark