Man in the Middle: HTTP and HTTPS

Reading Time: 2 minutesIn the world of internet security, the lack of authentication and encryption in online communication has raised concerns about potential vulnerabilities. Many have expressed worries about the possibility of man-in-the-middle attacks, which could manipulate unsecured ...

Pwn2Own Toronto 2022

Reading Time: 2 minutesI had the honor of being a guest at Pwn2Own 2022 hosted by Trend Micro in Toronto. The event consisted of teams of security researchers or a single researcher demonstrating active exploitation of zero days ...

Journey to CISSP

Reading Time: 2 minutesMany who passed this exam share their experience and I would like to do the same, after all, sharing information helps the Cybersecurity world. Also, furthering the profession is one of the CISSP ethics canons. ...