🥇

DE:CODED – Firewall speeds and VPN risks

“If they are not getting any money from you, then where are they getting the money from?” Show notes for series 2, episode 2 Is your firewall as fast as you think? ...
The Phantom Credentials of SCCM: Why the NAA Won’t Die

The Phantom Credentials of SCCM: Why the NAA Won’t Die

TL;DR — Stop Using Network Access Accounts!If a Windows machine has ever been an SCCM client, there may be credential blobs for the network access account (NAA) on disk.If an Active Directory account has ever ...
How Information Security Breaks The Classic IT Model

How Information Security Breaks The Classic IT Model

How Information Security Breaks The Classic IT ModelFrom The Other Side Of The PO Blog: Part 4CEO: “ Due to complications in the market with unexpected changes in product and customer spending, ...
Hackers Also Have Financial Reporting And Quotas :)

Hackers Also Have Financial Reporting And Quotas :)

Hackers Also Have Financial Reporting And Quotas :)“Chief Hacking Officer: Yevi, where are you at with London bank hack?”“Yevi, I think we are okay; we should have something by Friday.”“Chief Hacking Officer: ...

Hacking Ham Radio: Why It’s Still Relevant and How to Get Started

This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce. In this episode you’ll learn what ham radio is, why its still relevant, why would ...
Why Getting Hacked Is Just What Your Organization Needs

Why Getting Hacked Is Just What Your Organization Needs

Why Getting Hacked Is Just What Your Organization NeedsWhy do the CFO(Chief financial officer), COO(Chief operating officer, CIO(Chief information officer), and CRO(Chief risk officer) need to report to CISO(Chief information security officer), ...
How to Find the Owner of a Phone Number | OSINT

How to Find the Owner of a Phone Number | OSINT

| | Cyber Security, Hacking
There are a lot of methods to find the owner of a phone number using social Engineering Techniques. We have listed some of the OSINT methods to find the owner of a ...
Weekly Blog Post

Weekly Blog Post

Weekly Blog PostAt The Corner Of Cyber And BlogShould Being Hacked Lead To A Termination Of Employment?Sunset in Carlsbad California“What happened, people?”“Sir, we got hacked again through the firewall. Somehow they found ...
Threat Modeling Should Be A Team Sport

Threat Modeling Should Be A Team Sport

Threat Modeling Should Be A Team SportPen-tester, Vulnerability Scanning, Risk Management, and Threat Modeling should be one engagement.Pen-tester, Vulnerability Scanning, Risk Management, and Threat Modeling should be one engagement.In 2020, a group ...
Cyber Security DE:CODED podcast

DE:CODED – Can Microsoft solve security?

“I have a PC… I like their delete key, which doesn’t exist on the Mac.” Show notes for series 2, episode 1 Can Microsoft solve security? Do you need anti-virus on your ...