Look what I'm reading ma... π°π€ 2024 28 Jun Experimenting writing for 30 Days 27 Jun Adversary Tactics RTO - Day 4 26 Jun Adversary Tactics RTO - Day 3 25 Jun Adversary Tactics RTO - Day 2 24 Jun Adversary Tactics RTO - Day 1 23 Jun Bypassing Oktaβs Passwordless MFA: Analysis 22 Jun Hijacking GitHub Runners 21 Jun Dependency Confusion 20 Jun Apple Private Cloud Compute: First Glance 19 Jun Snowflake Data Breach 18 Jun Cyber Scarecrow: A Better Trap? 17 Jun From Prompt Injection to Data Exfiltration 16 Jun Microsoft Chooses Profit over Security 15 Jun Infrastructure as Code for Red Teamers 14 Jun Malpedia: Malware Identification 13 Jun China's Cyber Ecosystem and Hacking Scene 12 Jun Tales of the Breach with Field CISO 11 Jun Google Leak Reveals Thousands of Privacy Incidents 10 Jun Microsoft Recall Response to Criticism 9 Jun How to Quit Google 8 Jun Modern WAF Bypass Techniques 7 Jun Building LLMs: Insights 6 Jun TotalRecall: Recall is worst than I thought 5 Jun Hacking Millions of Modems 4 Jun TerminalTextEffects: Because why not? 3 Jun Tracking AitM Campaigns 2 Jun Midpoint Longevity and Injury Prevention Protocol 1 Jun OSINT process of a Data Dump Admin 31 May Operational Relay Box Networks (ORBs) 30 May Offensive AI Tooling: Finally Arrived? 29 May SSID Confusion: EvilTwin Remix? 28 May Practical Password Cracking with a Modern Touch 23 May Microsoft Recall: FML