Intro Last month, my team and I participated in the CCDC competition – an exciting cyber defense challenge where teams
CyberSec

Exploring Web Security with OWASP BWA
In this blog post, I’ll take you through my hands-on exploration of common web vulnerabilities using the OWASP Broken Web

OAuth 2.0 — Security Considerations
Background Previously, the common way for granting authenticated access to web applications was through the use of a username and

Cookie’s SameSite Attribute vs CSRF — Demystified
Ambient Authority in the browser Whenever the browser sends off an HTTP request, it includes all the corresponding cookies for

FFUF — Everything You Need To Know
FFUF, short for “Fuzz Faster you Fool” is an open-source web fuzzing tool written in Go programming language, intended for

Lockheed Martin Cyber Kill Chain — Illustrated
The cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the

CURL — Everything You Need To Know
curl is a command-line utility for transferring data from or to a server designed to work without user interaction. With curl, you

NIST Methodology of Incident Response — Illustrated
In this article, we will act as a network defender and apply our expertise in intrusion detection and response skills

An Overview of Cybersecurity Compliance
A cyber attack! [delay- a half minute] Again another one! Did you know there is a malicious attack every other