Dorian Oliver CollierJan 18, 20205 min readCatching Phish: WhatsApp Phishing in Sierra Leone (Part 1)First in a series explaining how phishing scams work in real life.
Matthew LashnerJan 16, 20207 min readThe 5 Stages of OSCP : A Story of Mental AnguishMatthew Lashner is a glutton for punishment, if I ever saw one. I met him online on my own ill-fated quest for the OSCP 133t h4x0r certific
James RileyJan 16, 20209 min readRecruiter Advice: James Riley, PenTesting & AppSec Recruiter @ Advance Resource Managers Advice from a person who helps cybersecurity pros and newbies alike get their perfect job!
Matthew TwellsJan 12, 20208 min readRyuk Me Like A Hurricane - Ransomware ExplainedRansomware has hit cities, companies and governments worldwide over the last two years, and attacks are just getting nastier and nastier.
jonojh48Jan 10, 202014 min readQ and A: Jonothan Harvey, ex-Royal Marine and Penetration Tester at CoalfireJonothan is a very good friend of mine who has made the walk from the Royal Marines into a coveted job as a Penetration Tester - I caught...
Matthew TwellsDec 14, 20194 min readWhatsApp with all these RCEs?Written in Conjunction with Information Risk Management (IRM) Ltd. and was first published at www.irmsecurity.com/resources Usually the...
Matthew TwellsDec 14, 20197 min readCyber Threat Hunting - The Hunted Become The HuntersWritten in conjunction with Crucial Academy Threat Hunting. The term sounds cool and currently is one of those buzzwords making its way...
Matthew TwellsDec 14, 20195 min read5G and the Art of Antenna MaintenanceWritten in Conjunction with Information Risk Management (IRM) Ltd. and first published on their website at https://www.irmsecurity.com/re...
Matthew TwellsDec 14, 20194 min readAWS : Just Another Drop In The BucketEveryone’s favourite platform to pretend they understand to their techie friends! Written in Conjunction with Information Risk Management...
Matthew TwellsDec 14, 20194 min readThe Cybersecurity Field Manual - Now in its 2nd Edition!The book any aspiring cyber professional should take a look at before diving headfirst into the breach.