Malicious Life Podcast: The Jester – Hacktivist for Good

The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that some of the Jester’s operations were little more t… Continue reading Malicious Life Podcast: The Jester – Hacktivist for Good

How to harden Kubernetes systems and minimize risk

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released a report which details threats to Kubernetes environments and provides configuration guidance to minimize risk. What is Kubernetes? Kubernetes i… Continue reading How to harden Kubernetes systems and minimize risk

How data manipulation could be used to trick fraud detection algorithms on e-commerce sites

As the marketing of almost every advanced cybersecurity product will tell you, artificial intelligence is already being used in many products and services that secure computing infrastructure. But you probably haven’t heard much about the need to secur… Continue reading How data manipulation could be used to trick fraud detection algorithms on e-commerce sites