Cached Credentials: Important Facts That You Cannot Miss
Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we're able to overwrite it, and what kind of threat it exposes.
Read moreUser Secrets: How to Get Them Back Using Password Recovery Tools
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system). Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
Read more
How to Jumpstart a Career in Cybersecurity in 2021
The new year has arrived! As we prepare to step into a metaphorical clean slate, many people are reignited by the idea of pursuing a new direction with greater goals, hopes, and dreams.
Read more
Don’t Take Candy or USBs from Strangers – USB attack is the serious threat
USB attacks cannot take place without human involvement because they rely on an individual (either knowingly or unknowingly) inserting a flash drive laced with malware into an unprotected device, typically located in a public place such as an office. Sometimes the drives are inserted out of curiosity, but they can also be plugged into a computer located nearby in a misguided act of helpfulness.
Read more