A Penetration Test almost always needs to begin with an extensive Information Gathering phase. This post talks about how Open Sources of information on the Internet can be used to…
In the tech industry, running into challenging personalities is almost a given. Whether it's a demanding client or a problematic colleague, dealing with difficult individuals—let’s call them “jerks” for simplicity—can…
Ever heard of the concept of knowing too much for your own good? Nowadays, artificial intelligence (AI) is grappling with an excess of knowledge, particularly in the realm of AI…
In the age of LLM infiltrating everything, even customer service, it's easy to see it as a potential attack route – and a pretty straightforward one at that. LLM's access…
Imagine you're curious about your Public IP address, and you only have a simple way to ask your computer. So, what do you do? In Python, we're going to figure…
Squawk! Meet Parrot Linux, a cool operating system that's all about security and hacking stuff! Squawk! Just like the smart and colorful bird it's named after, Parrot Linux has been…
Guess what? As we embark on Black History Month tomorrow, I'm enthusiastic about strengthening our community by giving back. Frequently, I'm approached with requests like, 'Bodega, teach me coding.' While…
Today has presented its fair share of challenges in the world of cybersecurity, as is often the case. However, the particular challenge that unfolded carried a rather amusing twist. The…
The Rubber Ducky USB, developed by Hak5, is a significant tool in cybersecurity, resembling a regular USB flash drive but capable of acting as a programmable keyboard. Initially designed for…