July 3, 2025
AI is Everywhere
June 30, 2025
AI is Everywhere: From Your Phone to the Doctor’s Office
How Does AI Actually Work?
June 25, 2025
How Does AI Actually Work? A Simple Guide
AI intro
June 20, 2025
AI Explained: What Is It and Why Should You Care?
OSINT Techniques
May 11, 2025
Level Up Your Investigations: 10 Actionable OSINT Techniques (10th Edition)
Hacked by backup
November 29, 2024
A story about a breach using a backup archive!
Backup is the first rescue line a company uses to handle a breach. But what happens if the backup is on the attacked server? And even worse, what happens when the backup file is the entrance vector for the hacker? A Russian hacker shared a story on a dark web blog about how he breached a company using a backup file.
Hire a hacker
November 21, 2024
Disclaimer
The information provided in this post is intended for educational and research purposes only. It is not intended to encourage or condone any illegal activities. Hiring a hacker or engaging in any form of unauthorized access to computer systems is illegal and can result in severe legal consequences. It is crucial to always respect the law and refrain from participating in criminal activities.
Tools of trade - HackRF One
November 14, 2024
Disclaimer
The information provided in this post is intended for educational and research purposes only. It is not intended to encourage or condone any illegal activities. Hiring a hacker or engaging in any form of unauthorized access to computer systems is illegal and can result in severe legal consequences. It is crucial to always respect the law and refrain from participating in criminal activities.
Tools of trade - Flipper Zero
November 7, 2024
Disclaimer
The information provided in this post is intended for educational and research purposes only. It is not intended to encourage or condone any illegal activities. Hiring a hacker or engaging in any form of unauthorized access to computer systems is illegal and can result in severe legal consequences. It is crucial to always respect the law and refrain from participating in criminal activities.
Tools of trade Digispark ATTINY85
October 31, 2024
Disclaimer
The information provided in this post is intended for educational and research purposes only. It is not intended to encourage or condone any illegal activities. Hiring a hacker or engaging in any form of unauthorized access to computer systems is illegal and can result in severe legal consequences. It is crucial to always respect the law and refrain from participating in criminal activities.
Two types of communication
March 22, 2024
Two types of communication
OWASP juice shop
September 6, 2023