Catching Attackers with Deception - A Hands-On Guide to Canarytokens
Deception technology plays a crucial role in modern cybersecurity by helping organizations detect and respond to threats more effectively. Since no security ...
Deception technology plays a crucial role in modern cybersecurity by helping organizations detect and respond to threats more effectively. Since no security ...
Happy new year to all of you! To be honest, I’ve never been enthusiastic about classic New Year’s resolutions. In my experience, they tend to be largely inef...
In this blog post, we’ll explore how to set up and run an httpd server (Apache HTTP Server) using a containerized environment with Podman. A key aspect of th...
With a cup of coffee in hand, I settled in front of my laptop, opened my IDE, and wrote a simple TCP port scanner in Bash. You can find it on GitHub. Of cour...
Not really, just a small pivot in this blog. From now on I will write my blog posts in English instead of German. Although I am not a native speaker, I hope ...