Subscribe
Sign in
Home
Yaksas Security
100 Days of Red Team
AKSH Lab Automation Bot
Learn Sendy
Red Team Training
Archive
About
Latest
Top
The Data Breach That Changed Everything
The 2013 Target data breach redefined cybersecurity forever, making it a board-level concern, leading to CISO hirings, and accelerating chip-and-PIN…
Jan 17
•
Uday Mittal
March 2025
Stay away from cheap Microsoft Office 365 accounts
Why you should not purchase Microsoft Office 365 accounts from shady websites and what can happen if you do?
Mar 30, 2025
•
Uday Mittal
February 2025
Book Review: Red Team - How to Succeed By Thinking Like the Enemy
Review of the book Red Team - How to Succeed By Thinking Like the Enemy by Micah Zenko. Book published in November 2015 by Basic Books.
Feb 2, 2025
•
Uday Mittal
1
December 2024
Book Review: Professional Red Teaming
Review of the book Professional Red Teaming by Jacon G. Oakley. Book published in January 2019 by Apress Publication.
Dec 29, 2024
•
Uday Mittal
1
Book Review: Adversarial Tradecraft in Cybersecurity
Review of the book Adversarial Tradecraft in Cybersecurity by Dan Borges. Book published in June 2021 by Packt Publication.
Dec 14, 2024
•
Uday Mittal
October 2024
Book Review: Web Application Security
Review of the book Web Application Security by Andrew Hoffman. Published in March 2020 by O'Reilly Publication.
Oct 21, 2024
•
Uday Mittal
Book Review: Container Security
Review of the book Container Security by Liz Rice. Published in April 2020 by O'Reilly Publication.
Oct 20, 2024
•
Uday Mittal
Mona.py for exploit devs: 6 must know commands
Six mona.py commands I regularily use during exploit development. They help me speed up the entire process. Watch the video for demonstartion.
Oct 19, 2024
•
Uday Mittal
Book Review: Red Team Development and Operations
Review of the book Red Team Development and Operations by Joe Vest and James Tubberville. Published in January 2020.
Oct 19, 2024
•
Uday Mittal
Seven Common Cryptography Attacks
Discover the seven most common cryptography attacks, including brute force, ciphertext-only, and differential cryptanalysis, and how they impact…
Oct 18, 2024
•
Uday Mittal
Book Review: The Cybersecurity Manager's Guide
Review of the book The Cybersecurity Manager's Guide by odd Barnum. Book published in March 2021.
Oct 7, 2024
•
Uday Mittal
Book Review: Penetration Testing Azure for Ethical Hackers
Review of the book Penetration Testing Azure for Ethical Hackers by David Okeyode, Karl Fosaaen. Book published in November 2021.
Oct 6, 2024
•
Uday Mittal
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts