Explained
Certifications
This guide will be a living collaborative document. To begin a career in Cyber Security you will need to lay the proper…
Social Engineering
Basically, it’s a non-technical way of manipulating people into strategically…
Red – Blue – Purple
You will hear, in many Cyber Security circles and conversations,…
Fundamentals
OSINT
This will be a living document and will get content added and/or updated as often as possible. Open Source Intelligence [OSINT] describes…
News
New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories
CLICK ON IMAGE ABOVE FOR SOURCE ARTICLE.
Fortinet FortiSIEM Vulnerability CVE-2025-64155 Actively Exploited in Attacks
CLICK ON IMAGE ABOVE FOR SOURCE ARTICLE.
One-Click Copilot Vulnerability Let Attackers silently exfiltrate sensitive user data
CLICK ON IMAGE ABOVE FOR SOURCE ARTICLE.
Palo Alto Networks Firewall Vulnerability Allows Attacker to Trigger DoS Attacks
CLICK ON IMAGE ABOVE FOR SOURCE ARTICLE.
Tools
nmap
🔍 Tool Tutorial for Beginners 📌 Goal Teach beginners what Nmap is, why it’s used, and how to perform safe, basic network…
More Articles
Mr Robot Season 1 Episode 1 E Corp DDoS
eps1.0 hellofriend Distributed Denial-of-Service (DDoS) Attack Attack Type: Large-scale volumetric + application-layer traffic flooding Distributed Denial of Service (DDoS) attack. Likely combination of: – Layer 3/4 SYN floods – HTTP GET floods (Layer 7) – Botnet-driven traffic amplification High-Level What Happened: A public website and…
Mr Robot Season 1 Episode 1 Ron’s Cafe
eps1.0 hellofriend Child Exploitation Dark Web Server Takedown Attack Type: Web server compromise via SQL injection High-Level What Happened: Elliot compromises a Tor-hidden service hosting illegal content and reports it to law enforcement. Reconnaissance: Persistent Access: Compromised the café’s internal systems Maintained persistence Monitored traffic…
Password Management
Password Management is simply a set of principles using best practices to efficiently create and manage passwords and/or passphrases to prevent unauthorized access. Passwords are the first line of defense in cybersecurity. Poor password habits are one of the most common causes of breaches, account…
Wi-Fi Basics
Wi-Fi is a wireless network that follows specific 802.11 IEEE standards and protocols used for Local Area Network [LAN] devices and internet access allowing the exchange of encrypted data via radio waves. The standard home equipment required is a Wireless Router. It uses a Service…
Virtual Private Network
A Virtual Private Network [VPN] is a method in which to connect to the internet privately & securely while encrypting your internet traffic to protect your online identity. There are 2 types of VPN: Personal & Corporate. PERSONAL: Designed for personal use and anonymity. CORPORATE:Used…
Threat + Vulnerability + Risk = Exploit
A ‘best practice’ is to prioritize your cyber security time and efforts, such as prioritizing issues that may arise. There are many ways of categorizing vulnerabilities such as by Critical, High, Medium, et cetera and the Common Vulnerability Scoring System [CVSS] rating numbers. In order…