RoCET: The Remote Code Execution Tool for the Web
10 Steps to a Sound Cyber Security Program
10 Things Every Job Seeker Should Know
Attacking Authentication in Web Applications
Dropbots: Command & Control using Cloud Storage
Internet 101: How Alice Talks to Bob
Does Patch Tuesday Really Matter Anymore? AKA: "Screw Patch Tuesday!"
Community Based Career Development
Another name for Intel: Honeypots
IDS Configuration for Beginners
Exposed: Getting Control of Your Vendors Before They Expose You
Are you pwning or being pwned?
GSuite Digital Forensics and Incident Response
Fiddling with Flash Drive Forensics
Tactics, Techniques and Procedures: Building and Running a Blue Team from Scratch
Strengthen Your SecOps Team by Leveraging Neurodiversity
Achieving Advanced Security Use Cases by Integrating Key Security Solutions with a Vulnerability Management System
Containers: No, Not Your Mama's Tupperware
Credential Stealing Emails - What you need to know
Get an Internship!
Cryptojacking Servers: The Intersection of poor patch management and ICO's
Everything Old is New Again
The SIEMpsons
Securing the Future of TLS: What's new in TLS 1.3
Adventures in Open Source Security Software
Zero to Hero: A Red Team's Journey
PowerShell exploitation, PowerSploit, Bloodhound, PowerShellMafia, Obfuscation, PowerShell Empire, the Empire has fallen, you CAN detect PowerShell exploitation
After Party