Man in the Middle: HTTP and HTTPS

Reading Time: 2 minutes In the world of internet security, the lack of authentication and encryption in online communication has raised concerns about potential vulnerabilities. Many have expressed worries about the possibility of man-in-the-middle attacks, which could manipulate unsecured ...

Pwn2Own Toronto 2022

Reading Time: 2 minutes I had the honor of being a guest at Pwn2Own 2022 hosted by Trend Micro in Toronto. The event consisted of teams of security researchers or a single researcher demonstrating active exploitation of zero days ...

Journey to CISSP

Reading Time: 2 minutes Many who passed this exam share their experience and I would like to do the same, after all, sharing information helps the Cybersecurity world. Also, furthering the profession is one of the CISSP ethics canons. ...