Posts about

Technology

Learn reverse engineering with Ghidra, the free tool built by the NSA

Taking malicious code apart helps analysts understand how it works. Such reverse engineering...

How Snyk Helps you Keep up with Container Security Challenges

Containers help companies to create scalable cloud-native apps and improve legacy systems. So it...

Tech Data Video: RangeForce Hands-On Splunk Training Modules

Join Tech Data Cyber Range Engineers Josh and John as they present another one of their Tech...

Why Malicious Actors Love PowerShell Attacks and How to Defend Them

Cybersecurity professionals and threat actors remain perpetual nemeses, as the latter continue...

10 Ways Security Hackers Exploit Passwords & Enterprise Credentials

Compromised passwords represent some of the weakest links in online security. Financially...

Why SQL Injection is Here to Stay in the OWASP Top 10

 

SQL and SQL Injection

Structured Query Language (SQL) is the language used to interact with...

Understanding the Power of YARA Rules & YARA Training

YARA is a powerful and flexible pattern matching tool. It runs from a command line on Linux and...

How to Prevent Blind SQL Injection

Blind SQL injection is similar to normal SQL injection, except that the HTTP responses will not...

How to Prevent Blind Command Injection

Executing a Command Injection attack simply means running a system command on someone’s server...

Guides, Research & More