Featured Blog
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
Earlier this week, Krebs on Security reported that an employee of the Department of Governmental Engineering (DOGE) accidentally published a secret API key that granted access to unreleased AI models from Elon Musk’s xAI venture (source). Even more disturbing: researchers found the DOGE API key still worked after the employee was notified of the leak […]
Compliance, Cybersecurity, Financial Sector, General, Government, Health care, IT, Legal, Password, Privacy, Tools
RULES, WHAT RULES? The Importance of Communicating Your Organization’s User Security Expectations
Breaches, Cyberattacks, Cybersecurity, DDoS, Digital Forensics, General, IT, Network Forensics, Privacy, Tools, Vulnerabilities
RIP Office365 Magic Unicorn Tool
Breaches, Cybersecurity, Digital Forensics, Network Forensics, Tools
Exposing the Secret Office 365 Forensics Tool
Breaches, Cyberattacks, Cybersecurity, Malware, Ransomware
Cyber Alert: New Ransomware Holds Individual File Shares Hostage
Breaches, Cyberattacks, Cybersecurity, Network Forensics, Vulnerabilities
Manually Exploiting MS17-010
Cybersecurity, Digital Forensics, Malware, Ransomware, Vulnerabilities
How To Search for Strings on a Disk Image Using The Sleuth Kit
Cyberattacks, Cybersecurity, IoT, IT, Network Forensics
How to Get Started with DIY Home Network Monitoring
Cyberattacks, IT, Vulnerabilities