Basic Authentication Versus CSRF
5 days, 21 hours ago |
www.trustedsec.com
The Client/Server Relationship — A Match Made In Heaven
1 month, 1 week ago |
www.trustedsec.com
Modeling Malicious Code: Hacking in 3D
2 months, 1 week ago |
www.trustedsec.com
Chaining Vulnerabilities to Exploit POST Based Reflected XSS
2 months, 2 weeks ago |
www.trustedsec.com
Obfuscation Using Python Bytecode
3 months, 1 week ago |
www.trustedsec.com
Control Tower Pivoting Using the Default Role
3 months, 1 week ago |
www.trustedsec.com
The Nightmare of Proc Hollow’s Exe
3 months, 1 week ago |
www.trustedsec.com
OneDrive to Enum Them All
3 months, 2 weeks ago |
www.trustedsec.com
PPID Spoofing: It’s Really this Easy to Fake Your Parent
3 months, 3 weeks ago |
www.trustedsec.com
Learning Sysmon – Videos 1-10
4 months, 2 weeks ago |
www.trustedsec.com
Windows LAPS: Closing a Gap for Cloud-Native Device Management
4 months, 2 weeks ago |
www.trustedsec.com
Cross Site Smallish Scripting (XSSS)
4 months, 3 weeks ago |
www.trustedsec.com
Compliance Abuse: When Compliance Frameworks are Misapplied
4 months, 4 weeks ago |
www.trustedsec.com
Hacking Your Cloud: Tokens Edition 2.0
5 months, 1 week ago |
www.trustedsec.com
On the Road to Detection Engineering
5 months, 2 weeks ago |
www.trustedsec.com
Cisco Hackery: TcL Proxy
5 months, 2 weeks ago |
www.trustedsec.com
Android Hacking for Beginners
5 months, 3 weeks ago |
www.trustedsec.com
What You Need to Know About SBOM
5 months, 3 weeks ago |
www.trustedsec.com
Shells in Plain Sight – Storing Payloads in the Cloud
6 months, 1 week ago |
www.trustedsec.com
Red vs. Blue: Kerberos Ticket Times, Checksums, and You!
6 months, 1 week ago |
www.trustedsec.com
Changes in the Beacon Object File Landscape
6 months, 2 weeks ago |
www.trustedsec.com
Getting Analysis Practice from Windows Event Log Sample Attacks
6 months, 2 weeks ago |
www.trustedsec.com
RPC Programming for the Aspiring Windows Developer
6 months, 3 weeks ago |
www.trustedsec.com
ESXiArgs: The code behind the ransomware
7 months, 2 weeks ago |
www.trustedsec.com
ESXiArgs: What you need to know and how to protect your data
7 months, 2 weeks ago |
www.trustedsec.com
TeamFiltration V3.5.0 – Improve All the Things!
7 months, 2 weeks ago |
www.trustedsec.com
The First Steps on the Zero Trust Journey
7 months, 3 weeks ago |
www.trustedsec.com
How Threat Actors Use OneNote to Deploy ASyncRAT
7 months, 3 weeks ago |
www.trustedsec.com
New Attacks, Old Tricks: How OneNote Malware is Evolving
7 months, 3 weeks ago |
www.trustedsec.com
A LAPS(e) in Judgement
8 months, 2 weeks ago |
www.trustedsec.com
Basic Authentication Versus CSRF
5 days, 21 hours ago |
www.trustedsec.com
Items published with this topic over the last 90 days.
Latest
Basic Authentication Versus CSRF
5 days, 21 hours ago |
www.trustedsec.com
The Client/Server Relationship — A Match Made In Heaven
1 month, 1 week ago |
www.trustedsec.com
Modeling Malicious Code: Hacking in 3D
2 months, 1 week ago |
www.trustedsec.com
Chaining Vulnerabilities to Exploit POST Based Reflected XSS
2 months, 2 weeks ago |
www.trustedsec.com
Obfuscation Using Python Bytecode
3 months, 1 week ago |
www.trustedsec.com
Control Tower Pivoting Using the Default Role
3 months, 1 week ago |
www.trustedsec.com
The Nightmare of Proc Hollow’s Exe
3 months, 1 week ago |
www.trustedsec.com
OneDrive to Enum Them All
3 months, 2 weeks ago |
www.trustedsec.com
PPID Spoofing: It’s Really this Easy to Fake Your Parent
3 months, 3 weeks ago |
www.trustedsec.com
Learning Sysmon – Videos 1-10
4 months, 2 weeks ago |
www.trustedsec.com
Windows LAPS: Closing a Gap for Cloud-Native Device Management
4 months, 2 weeks ago |
www.trustedsec.com
Cross Site Smallish Scripting (XSSS)
4 months, 3 weeks ago |
www.trustedsec.com
Compliance Abuse: When Compliance Frameworks are Misapplied
4 months, 4 weeks ago |
www.trustedsec.com
Hacking Your Cloud: Tokens Edition 2.0
5 months, 1 week ago |
www.trustedsec.com
On the Road to Detection Engineering
5 months, 2 weeks ago |
www.trustedsec.com
Cisco Hackery: TcL Proxy
5 months, 2 weeks ago |
www.trustedsec.com
Android Hacking for Beginners
5 months, 3 weeks ago |
www.trustedsec.com
What You Need to Know About SBOM
5 months, 3 weeks ago |
www.trustedsec.com
Shells in Plain Sight – Storing Payloads in the Cloud
6 months, 1 week ago |
www.trustedsec.com
Red vs. Blue: Kerberos Ticket Times, Checksums, and You!
6 months, 1 week ago |
www.trustedsec.com
Changes in the Beacon Object File Landscape
6 months, 2 weeks ago |
www.trustedsec.com
Getting Analysis Practice from Windows Event Log Sample Attacks
6 months, 2 weeks ago |
www.trustedsec.com
RPC Programming for the Aspiring Windows Developer
6 months, 3 weeks ago |
www.trustedsec.com
ESXiArgs: The code behind the ransomware
7 months, 2 weeks ago |
www.trustedsec.com
ESXiArgs: What you need to know and how to protect your data
7 months, 2 weeks ago |
www.trustedsec.com
TeamFiltration V3.5.0 – Improve All the Things!
7 months, 2 weeks ago |
www.trustedsec.com
The First Steps on the Zero Trust Journey
7 months, 3 weeks ago |
www.trustedsec.com
How Threat Actors Use OneNote to Deploy ASyncRAT
7 months, 3 weeks ago |
www.trustedsec.com
New Attacks, Old Tricks: How OneNote Malware is Evolving
7 months, 3 weeks ago |
www.trustedsec.com
A LAPS(e) in Judgement
8 months, 2 weeks ago |
www.trustedsec.com
Top (last 7 days)
Basic Authentication Versus CSRF
5 days, 21 hours ago |
www.trustedsec.com
Jobs in InfoSec / Cybersecurity
Business Information Security Officer
@ Metrolink | Los Angeles, CA
Senior Security Engineer
@ Freedom of the Press Foundation | Remote, 4 hour time zone overlap with New York City
Security Engineer
@ ChartMogul | Remote, EU
Elastic Consultant - EMEA
@ Elasticsearch | Germany
Software Development Engineer, Security
@ Binance | Romania, Bucharest
Digital Network Exploitation Analyst III
@ Aperio Global, LLC | Fort Meade, Maryland, United States