Cached Credentials: Important Facts That You Cannot Miss
Why changing your cached credentials to 0 or 1 is… pointless? I will show you how cached logon data works, what is inside, how we're able to overwrite it, and what kind of threat it exposes.
Read moreUser Secrets: How to Get Them Back Using Password Recovery Tools
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system). Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
Read more
The Power of Reports and Software Testing
The power of reports and software testing has been appreciated by criminals in their marketing strategy. There is a fairly large list of Ransomware-as-a-Service "companies" on the market that allow people - not having much of a clue about hacking attacks - to enter the world of cybercriminals and obtain financial benefits illegally. Criminal organizations that compete in the fight for customer attention invest in marketing. In this regard, they don't differ from any other legally operating IT company.
Read more
Salaries in Cybersecurity
We often get questions about salaries in cybersecurity, and since they differ from company to company, it will be good to rely on publicly available information that will allow us to outline the issue from a broader perspective.
Read more