Articles Cybersecurity PrinciplesVulnerability Scanning vs Penetration Testing: Why Both are Important Cybersecurity TransformationCybersecurity Transformation Roadmap Checklist Cybersecurity Skills9 Things I’ve Learned Writing Phishing Emails Cybersecurity TutorialsBeyondTrust Privileged Remote Access – Ultimate Deployment Guide Nmap OS Detection: Easy, Fast, and Powerful Examples [How To Guide] Microsoft LAPS: Setup, Install, Use, And Secure With Multi-Factor Authentication Dynamically create a phishing page based on the HTTP referer header Enforcing better Active Directory passwords (Password audit part 3) Cracking Active Directory passwords (Password audit part 2) Brute force attack your own users (Password audit part 1) Bug Bounty HuntingHow I Bought a £240.00 Annual Subscription for Bargain £0.01 Pre-Account Takeover by Reversing a Weak Email Verification Token Algorithm Cracking Encrypted Credit Card Numbers Exposed By API One Time Code Bypass With An Inverted Brute-Force Attack Bug Bounty Hunting Tips #6 — Simplify Bug Bounty Hunting Tips #5 — Aim to Become World-Class in Your Niche Bug Bounty Tips #4, Covid-19 phishing, and more Bug Bounty Hunting Tips #3 — Kicking S3 Buckets Bug Bounty Hunting Tips #2 —Target their mobile apps (Android Edition) Bug Bounty Hunting Tips #1— Always Read the Source Code