Blog

SCADA/ICS Hacking and Security: Chinese APT, Volt Typhoon, Has Compromised Numerous Industrial Systems in the US!

Welcome back, aspiring cyberwarriors! In a cyberwar, SCADA and ICS industrial systems can be both a target and a weapon! Although the ongoing tensions between the U.S. and China are often framed as a trade war, Chinese state-sponsored actors have been known to compromise and maintain persistent access to critical U.S. infrastructure—sometimes for years. In […]

Continue Reading

Physical Security: Hacking Elevators to Gain Physical Access

Welcome back, my aspiring cyberwarriors! In the realm of physical security and red team operations, elevators present an often-overlooked but strategically important vector. While they may seem like mundane infrastructure, elevators are embedded with layers of logic, legacy systems, and mechanical overrides that can be leveraged or manipulated—given the right access and knowledge. Understanding how […]

Continue Reading

SDR (Signals Intelligence) for Hackers: Soon, all Cellphones will be Connected by Satellites

Welcome back, my aspiring cyberwarriors!   In earlier posts here, we have described hacking satellite communication systems. While many might see that type of hacking as very advanced and maybe a bit esoteric, new technologies are about to make satellite communication ubiquitous for everyone with a cellphone. We are on the cusp on an era […]

Continue Reading

NymVPN. Is This the World’s Most Secure VPN?

Welcome back, my aspiring cyberwarriors!   The landscape of digital privacy continues to evolve as surveillance capabilities expand globally. Our digital footprints are continuously tracked, analyzed, and leveraged by various entities. While traditional privacy tools focus on encrypting the content of communications, they often overlook a significant vulnerability: metadata. This “data about your data” reveals […]

Continue Reading

Cyber Threat Intelligence (CTI) and Network Defenses: Getting Started with CrowdSec

Welcome back, aspiring cyberwarriors!   In the ever-evolving landscape of cybersecurity, new tools and approaches are constantly emerging to combat the growing sophistication of cyber threats. One such innovative solution is CrowdSec, a free and open-source security automation tool that leverages the power of crowdsourcing to detect and mitigate cyber attacks. This article delves into […]

Continue Reading

Open-Source Intelligence(OSINT): Sherlock – The Ultimate Username Enumeration Tool

Welcome back, aspiring OSINT investigators!   Social media platforms hold a wealth of personal and professional information, making them valuable for reconnaissance in penetration testing and cyberwarfare operations. Sherlock is a lightweight yet powerful tool designed to search for social media profiles using a username. In this article, we’ll guide you through installing and using […]

Continue Reading