Solving Garbage with Radare2

Flare-on is a great CTF-style event. Its popularity means you can find many write ups for the same challenge, so you can pick and choose new techniques and tools to learn. I ...

R2con 2020 Review

The first international congress for Radare was held in 2016 to mark the ten year anniversary of the project. Although this was supposed to be a one-time event, the Radare community has ...
Windows Hardening Checklist image

A Comprehensive Checklist for Windows Hardening

| | Infosec Blog, security
What is hardening? Hardening involves reducing risk through the identification and remediation of vulnerabilities across the attack surface of a system. A system tends to have more vulnerabilities or a larger attack ...

Training to Help You Transform Into a Savvy IT Professional

Company culture is something that’s unique to each business. Here at Hurricane Labs, one of the areas we emphasize is education and being lifelong learners. This blog post was inspired by the ...

To Click or Not to Click: An OSINT Investigation Overview

| | Infosec Blog, security
Have you ever gotten an email from someone with a message saying “Please see attached,” “Past due notice,” or, my favorite, “Invoice #” and wondered if you should click on that link? ...
b00t2root CTF: cuz rsa is lub [RSA Cryptography]

Setting up a Virtual Machine for Your CTF Toolbox

| | Infosec Blog, security, Threat Research
You may have seen some Capture the Flag (CTF) writeups on the Hurricane Labs blog recently! If you’re wondering how to get started yourself, this blog post will help you set up ...
Insider Look from the Frontlines of Cybersecurity

Insider Look from the Frontlines of Cybersecurity

There are many questions swirling around about what really goes on in the often complex world of cybersecurity. In this Q&A-style blog post, Hurricane Labs’ John Diez provides some insight from the ...
Navigating Network Security for Remote Workers

Navigating Network Security for Remote Workers

| | Infosec Blog, security
As we approach six months of the grand remote working experiment (i.e., the pandemic), one of the most glaring weaknesses to corporate network security has become obvious: the end user working from ...
A Day in the Life of a SOC Architect

A Day in the Life of a SOC Architect

The security operations center (SOC) requires a number of roles in order to succeed day to day: SOC Analysts investigate security incidents raised by security tools. SOC Architects work directly with customers and security ...
Watch Elon Musk's ENTIRE live Neuralink demonstration

Man and Machine: A Look at Neurotechnology

| | Infosec Blog, Perspectives
The continuous advancement of technology makes our interconnected lives more exciting by the moment. The more connected we become, the more we must question: where does it stop? Is the sky the ...