PinnedJoe ShenoudaThe Rising Threat of SaaS Rootkits: Exploiting Hidden Rules in Microsoft 365The ever-evolving threat landscape has seen a new attack vector emerge, one that targets vulnerabilities within Microsoft’s OAuth…Mar 26, 2023Mar 26, 2023
PinnedJoe ShenoudaGoing Underground: Unearthing Sustainable Possibilities for Urban DevelopmentAs global urbanization accelerates, urban planners and architects strive to meet the increasing demand for housing and infrastructure…Mar 24, 2023Mar 24, 2023
Joe ShenoudaOctober: The Month to Amplify Cybersecurity Awareness in Europe, with a Focus on NIS2As a Dutch cybersecurity expert, I’ve witnessed the rapidly evolving landscape of cybersecurity in Europe. This October, also known as…Sep 29, 2023Sep 29, 2023
Joe ShenoudaBugProve Launches Free Plan for Comprehensive Vulnerability Discovery and Firmware Analysis ToolBugProve has launched a free plan for its comprehensive vulnerability discovery and firmware analysis tool. The free program is designed to…Mar 30, 2023Mar 30, 2023
Joe ShenoudaKubernetes Compliance Made Easy: Your Essential Guide to Maintaining a Secure and Compliant Cloud…Are you struggling with Kubernetes compliance? You’re not alone! Compliance has become increasingly important with the growing adoption of…Mar 19, 2023Mar 19, 2023
Joe ShenoudaCybersecurity in 2030: 7 Trends Shaping the Future of Digital SecurityWe are exploring the evolving landscape of cybersecurity and the challenges we must address by the end of the decade.Mar 18, 2023Mar 18, 2023
Joe Shenouda10 Hard-Hitting Realities Every Entrepreneur Must EmbraceThe entrepreneurial journey is often romanticized, but the path to success is paved with hard-hitting realities that startup founders must…Mar 18, 2023Mar 18, 2023
Joe ShenoudaBeware of CVE-2023–23397 — A High-Risk Outlook VulnerabilityOn March 14, Microsoft released 74 patches for its products, including a critical one for a high-risk Outlook vulnerability…Mar 18, 2023Mar 18, 2023
Joe ShenoudaIntroducing a Simple Proxy Scraper: Fetch Proxies from Multiple Sources with EaseA beginner-friendly Python script that scrapes HTTP, SOCKS4, and SOCKS5 proxies and saves them to a text fileMar 18, 2023Mar 18, 2023
Joe ShenoudaThe Ransomware Kill ChainCybercrime is a serious and organized crime that has a significant impact on businesses worldwide. Ransomware is a type of malware that…Mar 18, 2023Mar 18, 2023