Misleading HTTP Status codes and how I got my first CVEs Many things can happen while working on a pentest, and some vulnerabilities might actually become CVEs. What is a CVE? short for Common Vulnerabilities and Exposures, and found in a… Read More
How to protect your systems against recent Threat Actor’s activity?
How to protect your systems against recent Threat Actor’s activity? There are specific reasons for any attack, includin cyber security attacks. In the past, people thought that targets are picked randomly. Cybersecurity experience helped us understand that today that there’s… Read More
The role of Cyber Ops in a shooting war
The role of Cyber Ops in a shooting war Everybody in the cyber security field, whether blue team or red team has asked themselves at least once: How a cyber war would play out either between two nation-states with similar… Read More
How to get started in Cyber Security?
How to get started in CyberSecurity? Are you thinking to start a career in cybersecurity as a Pentest Engineer? The thrill of finding risks and vulnerabilities in different systems sounds exciting to you? We put together some resources that might… Read More
Women in CyberSecurity
Women in CyberSecurity at Cyber Threat Defense Today we are celebrating a beautiful day for all the women everywhere, The International Women’s Day in 2022. We wanted to explore more about being a female and working in Cyber Security, a… Read More
Are we protected in modern cars?
Are we protected in modern cars? A huge step in the evolution of vehicular transport was when cars became more than just a mechanical ensemble. Cars are now more sophisticated, having met the hardware with software-related parts. People benefit from… Read More
Money Laundering through Crypto Methods
Money Laundering through Crypto Methods Money laundering is referring to the process of making and masking large amounts of money generated by criminal activity, as if it has come from a legitimate source. Through the process of “laundering”, dirty money… Read More
Log4j Vulnerability, how to stay safe?
Log4j Vulnerability, how to stay safe? Apache Log4J As the number of cybersecurity attacks is increasing at every moment, we have to be aware of the new vulnerabilities that can affect us. On November 24, 2021, a zero-day vulnerability was… Read More
A real Red Team Exercise, how to get in?
A real Red Team Exercise, how to get in? In this article, we’ll be talking about a red teaming assessment on a FinTech company, what has taught us and what we have actually learned from it. Today organizations know they… Read More
Will the Metaverse become part of our lives in the near future?
As we all know, Metaverse was announced to be launched by Mark Zuckerberg. This seems to be the next wave of computing which will also involve a deeper understanding of the user’s behavior and privacy details. This information will create… Read More