Author Archive

TheFatRat and BeEF – Pre and Post Exploitation Method

A few weeks ago, I wrote about TheFatRat remote post exploit

TheFatRat

TheFatRat is a post-exploitation tool that can be used by security

Monero – the Bitcoin of the Darknet

Bitcoins are the currency of choice when it comes to Darknet

My ICO experience with Bread (BRD)

In December 2017, I participated in a crypto token ICO (Initial

WEBINAR: Don’t Click This Link

WEBINAR: Don’t Click This Link Addressing the Human Factor in Cybersecurity

Ethereum 101 – Everything you need to know

I ran across a post from Reddit user CryptigoVespucci (https://www.reddit.com/user/CryptigoVespucci) where he

The Future of Cybersecurity Part I: The Problem of Complexity

It seems like CSOs are always seeing flashing red lights on

The Future of Cybersecurity Part II: The Need for Automation

  The growing complexity (Part 1) of today’s networks and the growing

How to Stop Cyber-Bullying With Mobile Parental Control App

The widespread adoption of mobile phones and the internet has dramatically