Video: Bug Hunting as a Second Income

Video and Slide Deck from EH-Net Live! July 2018 When most think of selling bugs, they have visions of the underground hacking scene populated by nefarious characters using their 0-days for illegal activity. But what if you could get in on the bug hunt… Continue reading Video: Bug Hunting as a Second Income

Credential Phishing – Easy Steps to Stymie Hackers

Phishing attacks have become a common factor in our daily routines for businesses and in our personal lives. There are many different types of phishing attacks, each of which requires a slightly different defense while having some commonalities as well… Continue reading Credential Phishing – Easy Steps to Stymie Hackers

Book Review: Investigating Cryptocurrencies

As the saying goes, “Follow the money.” Regardless of one’s philosophical argument on the merits of a decentralized currency controlled by the masses and not a single government entity, criminals are utilizing the technology to their … Continue reading Book Review: Investigating Cryptocurrencies

Cybersecurity Career Path – A Fresh Perspective

My expertise is not necessarily laden in the land of career counseling, hiring standards, and education recommendations. However, anecdotally, coming into a cybersecurity career in an unorthodox manner and blossoming through passion and perseverance, t… Continue reading Cybersecurity Career Path – A Fresh Perspective

WeirdAAL (AWS Attack Library) Basics from the Authors

The cloud is everything. Organizations have either moved completely to the cloud, have a hybrid approach, or are actively planning a cloud strategy. Penetration testers have always had to provide their services anywhere the client’s environment t… Continue reading WeirdAAL (AWS Attack Library) Basics from the Authors

Poisonous Pi – The Execution of a Raspberry Pi Hacking Workshop

43 years ago, a small team led by Chuck Peddle changed the way society computes today. In 1975, encased in plastic, this 40-pin DIP 8-bit microprocessor, known as the MOS Technology 6502, made its debut. Why should you care? Not only was this the cheap… Continue reading Poisonous Pi – The Execution of a Raspberry Pi Hacking Workshop

Webinar: Time’s up! GDPR is here – Now what?

Join us for EH-Net Live! Free Webinar on June 7 The world has gone GDPR crazy. Now that the deadline has passed, let’s take a quick look back at what happened, what to do next, the real world implications and its effect (if any) on the hacker com… Continue reading Webinar: Time’s up! GDPR is here – Now what?

Failure without Consequences after Breach

What we learned this week from the news is that, even after that catastrophic breach that Equifax had where the credit histories and records of over 145 million Americans were exposed to attackers, the entire board was re-elected. Let’s sharpen t… Continue reading Failure without Consequences after Breach