Author : Justin

Application Security

A Guide to Public Key Authentication Using SSH

Justin
The SSH (Secure Shell) protocol allows an ability to remotely, and securely, access hosts. SSH has various options for authenticating to a host including — password authentication, public-key authentication, and host-based authentication. Before we get into all of that, let’s...
Security OperationsOpen Source IntelligenceSocial Engineering

Protecting Your Brand from Domain Impersonation Attacks

Justin
Your website is an extension of your business, and your domain name represents that online presence by providing your visitors with an easy way to connect with your business whenever they want. Domain impersonation attacks have been around for a...
Open Source IntelligenceSecurity Operations

An Introduction To Automating Open Source Intelligence Gathering Using Spiderfoot

Justin
SpiderFoot is a Open Source Intelligence (OSINT) tool that combines the power of many Internet API’s to gather intelligence on Names, E-mail Addresses, Domains, IP Addresses, and more.  This article will help you get setup with a local installation of...
Security OperationsArtificial IntelligenceMachine Learning

Artificial Intelligence – Limitations, Attack Vectors, and Threat Modeling

Justin
Every couple of years a new or evolving technology bring about a whole new set of buzzwords that are often misunderstood by the general public. First, we saw the advent of the “cloud”, which is still not very well understood...

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More