networking, vulnerabilities, threats, attacks and countermeasures C2C2: command and control (server|connection) The connection a malware makes to the server of ... Read More
networking DoHDoH: DNS over HTTPS […] the requests are placed inside of an encrypted HTTPS ... Read More
networking DoTDoT: DNS over TLS takes standard DNS requests and places them inside a TLS ... Read More
Security Webinar takeaway – Malware of the DayMy key takeaways "Malware of the Day" is about simulating one malware or exploit ... Read More
Code, Security Webinar takeaway – Shellcode Execution with Pythonteaser for this Webcast, which made me attend Imagine you are pen testing a ... Read More
Security Webinar takeaway – The Ins and Outs of RITAMy key takeaways RITA is made to detect beacons and long connections open source ... Read More