Blog

SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia

Welcome back, aspiring cyberwarriors. As the war rages on, Russia’s gas exports have taken on heightened significance. This resource is literally and figuratively fueling Putin’s war efforts, which only underscores the need for attacks on this sector’s infrastructure. In this article, in collaboration with a student from Cyber Cossacks School – Citadel–we’ll show one vulnerability […]

Continue Reading

Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning

Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity among cybersecurity professionals, penetration testers and developers. Known for its exceptional speed, high degree of customizability, and accuracy in identifying security vulnerabilities, misconfigurations, and potential exploits across a wide range of digital assets and networks. This article will […]

Continue Reading

Bluetooth Hacking, January 14-16

Bluetooth Hacking is one of the most under-appreciated threats in our IoT World! For years, cybersecurity researchers consider Bluetooth safe and secure but in recent weeks and months, numerous vulnerabilities have been found within this protocol that are very frightening. These exploits include send arbitrary command into your phone or desktop (Blueducky) to the most […]

Continue Reading

What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?

Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital world would slow down considerably and even reading this article would be difficult and cumbersome. Nearly everything that is transmitted over the web is compressed to reduce latency and free up bandwidth. Compression is one of […]

Continue Reading