Work at AWS over the past year, I've had the opportunity to see the most common cloud security vulnerabilities firsthand...
Posted on
Android DIVA - Damn Insecure and vulnerable App for Android
DIVA is the mobile app version of DVWA. It's an app intentionally designed to be insecure so security analysts can experiment...
Posted on
OWASP Top 10 Overview
Overview of the OWASP top 10
Posted on
Open Source Intelligence (OSINT) resources
Threat intelligence is utilizing information to detect security threats that traditional methods and technologies may not and providing decision driven incident response...
Posted on
Log4j Zero-day vulnerability analysis
The popular Java logging library log4j (version 2) was exploited on Dec 9th resulting in remote code execution by logging....