Misleading HTTP Status codes and how I got my first CVEs Many things can happen while working on a pentest, and some vulnerabilities might actually become CVEs. What is a CVE? short for Common Vulnerabilities and Exposures, and found in a… Read More

Misleading HTTP Status codes and how I got my first CVEs Many things can happen while working on a pentest, and some vulnerabilities might actually become CVEs. What is a CVE? short for Common Vulnerabilities and Exposures, and found in a… Read More
How to protect your systems against recent Threat Actor’s activity? There are specific reasons for any attack, includin cyber security attacks. In the past, people thought that targets are picked randomly. Cybersecurity experience helped us understand that today that there’s… Read More
The role of Cyber Ops in a shooting war Everybody in the cyber security field, whether blue team or red team has asked themselves at least once: How a cyber war would play out either between two nation-states with similar… Read More
How to get started in CyberSecurity? Are you thinking to start a career in cybersecurity as a Pentest Engineer? The thrill of finding risks and vulnerabilities in different systems sounds exciting to you? We put together some resources that might… Read More
Women in CyberSecurity at Cyber Threat Defense Today we are celebrating a beautiful day for all the women everywhere, The International Women’s Day in 2022. We wanted to explore more about being a female and working in Cyber Security, a… Read More
Are we protected in modern cars? A huge step in the evolution of vehicular transport was when cars became more than just a mechanical ensemble. Cars are now more sophisticated, having met the hardware with software-related parts. People benefit from… Read More
Money Laundering through Crypto Methods Money laundering is referring to the process of making and masking large amounts of money generated by criminal activity, as if it has come from a legitimate source. Through the process of “laundering”, dirty money… Read More
Log4j Vulnerability, how to stay safe? Apache Log4J As the number of cybersecurity attacks is increasing at every moment, we have to be aware of the new vulnerabilities that can affect us. On November 24, 2021, a zero-day vulnerability was… Read More