How I feel when I hear or read “killchain” in “cyber” context.
My newbie girfriend thinks she can put a keylogger in my Linux distribution
by Gonzalo Ferrero
How development sometimes feels when trying to work with infosec
When devs say they’ll use “the AES crypto you asked for instead of DES”.
When you pentest an application and the client says that the application is already in production
“So today we’re going to talk about BYOD…”
My class B network pentest gets scoped down to 10 hosts port 80 only.
when you discover that you’re not alone on the server you run metasploit from
Say it with pixels.