back to top

c++

Ransomware Analysis Basics

Let's be honest... If the criminals do everything perfectly, getting your data back after a ransomware attack is nearly impossible without their key, and getting the key means paying the ransom. Is it impossible?...

UC – Detection via Deception

Adrian Sanabria explains why deception is the most overlooked opportunity in security operations today. This Free Upskill Challenge provides an introduction into how honeypots and honeytokens can be used as a cheat code for...

Mental Fortitude for Hackers

This may seem a bit odd coming from a site dedicated to teaching deep technical topics to skilled practitioners. Then again, I am a former mindfulness coach and yoga instructor turned pentester, so go...

API Hacking

API hacking expert, Dr. Katie Paxton-Fear, takes you far beyond her Free Upskill Challenges on the basics of APIs to be your personal guide on learning the hands-on skills needed in today's competitive job...