Password protecting your files using a password is a great way to add additional security controls. The problem is, there are tools out there that can crack them. You may also be in a situation where you can't remember the password of a file.
Rockyou.txt will only get you so far. When doing targeted attacks you might need something more specific to that user or site. This is when you want to generate your own wordlists to increase the chances of success......
Steganography is a way of hiding data in plain sight. With the use of steganography, you can hide data within other data files. Typically you would hide data inside an image, video or audio file. Here's is how...
Everyone is advertising free WiFi nowadays as a way to lure customers in. What these customers might not known is if the hotspot they are connecting to is genuine. It could be a Rogue AP setup by a malicious party in order to sniff your traffic. They provide you with free internet access and you provide them with all your network traffic. Here is how they do it.
The second part to checking how exposed you are online.
Protecting shared service accounts is always a hard task, especially when they have admin privileges. Here is a few things you can do to help you protect them using MFA.
Google dorking or Google Hacking is a hacking technique that uses the advance search functionality in Googles search engine.
Malicious parties are constantly trying to trick people in order to make some personal or financial gain. They spent quite a bit of time creating fake websites and spoofing emails in order to trick you into giving them information. This could be your payment information, credentials or other personal details that they can either use or sell. With all this going on, how can you be sure that those emails and links are genuine?
If you're a large organization, hiring a Cyber security firm to audit your security posture is a no brainer. Everything is exploitable and thinking that you are 100% secure nowadays is naive. You can purchase the best of the best security stack but no matter what, there will always be a weak chain somewhere. This is why these services exist. So that they help identify the gaps and help re-mediate them before someone malicious exploits them.
With these cloud solutions comes fancy new toys and potential money saving opportunities. All this seems like a no brainer but what do you lose?