Blog

In information security you have lots of people that learn to hack, that know how to find vulnerabilities and how to make exploits. They become pentesters or bounty hunters, or builders of hacking tools. They are the ethical variant of the hacker: they can break into systems but their intentions are good. Their skills are badly needed as they will...

The offensive security world is full of colors like red, blue, purple, black, grey, and white. Whether the last three are colors is a grey area. But what do these colors mean and which pieces of the security composition require which color?

What an unfair game that is!! The title is probably the worst possible advertisement for a game. You never want to play this game anyway, so why would you want to know the name. Unfortunately, you already know its name and play it daily: spot the phishing.

Maybe surprising at first, yet there is a clear link between magicians and phishers. Just think about it: a phisher tries to deceive you and making you take a risk, a magician deceives you by making you believe something impossible happened. Both of these professions use a combination of technical tricks combined with psychological understanding of...