PinnedJoe ShenoudaThe Rising Threat of SaaS Rootkits: Exploiting Hidden Rules in Microsoft 365The ever-evolving threat landscape has seen a new attack vector emerge, one that targets vulnerabilities within Microsoft’s OAuth…3 min read·Mar 26, 2023----
PinnedJoe ShenoudaGoing Underground: Unearthing Sustainable Possibilities for Urban DevelopmentAs global urbanization accelerates, urban planners and architects strive to meet the increasing demand for housing and infrastructure…3 min read·Mar 24, 2023----
Joe ShenoudaOctober: The Month to Amplify Cybersecurity Awareness in Europe, with a Focus on NIS2As a Dutch cybersecurity expert, I’ve witnessed the rapidly evolving landscape of cybersecurity in Europe. This October, also known as…3 min read·Sep 29, 2023----
Joe ShenoudaBugProve Launches Free Plan for Comprehensive Vulnerability Discovery and Firmware Analysis ToolBugProve has launched a free plan for its comprehensive vulnerability discovery and firmware analysis tool. The free program is designed to…3 min read·Mar 30, 2023----
Joe ShenoudaKubernetes Compliance Made Easy: Your Essential Guide to Maintaining a Secure and Compliant Cloud…Are you struggling with Kubernetes compliance? You’re not alone! Compliance has become increasingly important with the growing adoption of…2 min read·Mar 19, 2023----
Joe ShenoudaCybersecurity in 2030: 7 Trends Shaping the Future of Digital SecurityWe are exploring the evolving landscape of cybersecurity and the challenges we must address by the end of the decade.2 min read·Mar 18, 2023----
Joe Shenouda10 Hard-Hitting Realities Every Entrepreneur Must EmbraceThe entrepreneurial journey is often romanticized, but the path to success is paved with hard-hitting realities that startup founders must…2 min read·Mar 18, 2023----
Joe ShenoudaBeware of CVE-2023–23397 — A High-Risk Outlook VulnerabilityOn March 14, Microsoft released 74 patches for its products, including a critical one for a high-risk Outlook vulnerability…1 min read·Mar 18, 2023----
Joe ShenoudaIntroducing a Simple Proxy Scraper: Fetch Proxies from Multiple Sources with EaseA beginner-friendly Python script that scrapes HTTP, SOCKS4, and SOCKS5 proxies and saves them to a text file2 min read·Mar 18, 2023----
Joe ShenoudaThe Ransomware Kill ChainCybercrime is a serious and organized crime that has a significant impact on businesses worldwide. Ransomware is a type of malware that…2 min read·Mar 18, 2023----