PinnedCase Study: The Uber HackIn this section, we explore a cyberattack experienced by the company Uber. As in the previous case study, we will analyze the methods…Oct 1, 2023Oct 1, 2023
PinnedZero Trust: A Semantic Paradox in Security ArchitectureOur goal is to dispel the contradictions and ambiguities that are commonly associated with the term ‘zero trust’ and its philosophyOct 5, 2023Oct 5, 2023
Published inEmerge<in>TechCryptography 101: Why Is Predictability Often the Enemy of Security?Imagine you have a random number generator that creates a sequence of numbers. The shorter the sequence, the easier it is to guess. Think…Nov 101Nov 101
Cyber ResilienceIn this section, we talk about abstract insights from a part of our research on a concept that plays a significant role in strengthening…Aug 14Aug 14
Vulnhub: PWNOS 2.0In this part, we demonstrate two methods to compromise a target system and elevate privileges. The first method utilizes an exploitation…Jun 29Jun 29
Backdoor Attack and Defense on a Convolutional Neural NetworkIn this part, we are going to explore backdoor attacks and defenses. We will train clean and backdoored models using the CIFAR-10 dataset…May 2May 2
Evasion Attacks on a Convolutional Neural NetworkThe task involves conducting two evasion attacks on a Machine Learning model. Initially, we train our model using the CIFAR-10 dataset…Apr 14Apr 14
Anatomy of Cyber AttacksIn a large-scale security incident, you would want to immediately assess where the attackers are in the kill chain. Understanding their…Jan 24Jan 24