PinnedCase Study: The Uber HackIn this section, we explore a cyberattack experienced by the company Uber. As in the previous case study, we will analyze the methods…Oct 1, 2023Oct 1, 2023
Security Scans Can’t Promise You’re SafeSecurity tools often promote confidence — but rarely admit the unpleasant truth: no scan can prove a system is completely clean…2d ago2d ago
Published inEmerge<in>TechCryptography 101: Why Is Predictability Often the Enemy of Security?Imagine you have a random number generator that creates a sequence of numbers. The shorter the sequence, the easier it is to guess. Think…Nov 10, 20241Nov 10, 20241
Cyber ResilienceIn this section, we talk about abstract insights from a part of our research on a concept that plays a significant role in strengthening…Aug 14, 2024Aug 14, 2024
Vulnhub: PWNOS 2.0In this part, we demonstrate two methods to compromise a target system and elevate privileges. The first method utilizes an exploitation…Jun 29, 2024Jun 29, 2024
Vulnhub: Misdirection1Walkthrough of the Capture the Flag (CTF) challenge on Vulnhub.Jun 22, 2024Jun 22, 2024
Backdoor Attack and Defense on a Convolutional Neural NetworkIn this part, we are going to explore backdoor attacks and defenses. We will train clean and backdoored models using the CIFAR-10 dataset…May 2, 2024May 2, 2024
Evasion Attacks on a Convolutional Neural NetworkThe task involves conducting two evasion attacks on a Machine Learning model. Initially, we train our model using the CIFAR-10 dataset…Apr 14, 2024Apr 14, 2024
Anatomy of Cyber AttacksIn a large-scale security incident, you would want to immediately assess where the attackers are in the kill chain. Understanding their…Jan 24, 2024Jan 24, 2024