cybersecurity Featured How to Crack Passwords with John the Ripper Have you ever wondered how hackers crack passwords? In this post, we’ll explore the world of password cracking using the popular open-source tool, John the Ripper.
cybersecurity IDS vs. IPS: A Common Cybersecurity Interview Question “What’s the difference between IDS and IPS?” Here's a breakdown of the key facts about IDS and IPS that I find helpful when answering this question.
cybersecurity Unified Kill Chain: The Cyber Attack Cookbook What if I told you that real-world cyber attacks follow a series of well-defined steps - a kind of "recipe" that hackers use to execute their plans?
cybersecurity Featured Ever Wondered What’s Behind a Phishing Email? Security analysts don’t click on links blindly during their investigations. They use specialized tools that help safely analyse the email and understand its threats.
cybersecurity Is being a SOC analyst the dream job for cybersecurity enthusiasts? The role of a SOC analyst is both challenging and exciting. You're truly on the frontline, defending against cyber threats in real time.
cybersecurity EOL of Microsoft Office 2019 for MacBooks Example of EOL: Support for Microsoft Office 2019 ended in October 2023.
cybersecurity Are online password strength checker secure? The length of a password is more important than its complexity. Just try out the password strength checker.
cybersecurity Most common German passwords in 2023 These are the most commonly used passwords among Germans in 2023.