Why Security Debt Is the New Technical Debt
The Invisible Risk: When Your Attack Surface Changes
Do You Check for ShadowIT Risks?
Document metadata leaks and how attackers exploit them
Typo-squatting: more than typos
Why attackers love your forgotten subdomains
The Hidden Security Risks of Amazon S3 Buckets
EASM Starts with Discovery
Are You Leaving Your Doors Open? The Hidden Danger of Public-Facing Ports
Telegram: The New Playground for Hackers—Are You Watching?
What is Typo Squatting?
The Role of Domain Security in Phishing Prevention
Unveiling The Positive Potential of The Dark Web
Is it Illegal to Browse the Dark Web?
Introduction to Open Source Intelligence Gathering (OSINT)