LATEST POSTS

Blog2024-10-01T12:34:51-04:00

Our team researches and documents bleeding-edge security concepts and hacking techniques.
This blog explores these topics and more to keep you informed.

OSINT: From Basic Tools to Advanced Techniques

By |August 7, 2025|Blog|

What exactly is OSINT? Broadly speaking, OSINT—or Open-Source Intelligence—refers to the gathering, evaluation, and analysis of publicly available information to answer a specific question. This information can come from various sources, including public records, news ...

Attacks You Should Know About: Cross-Origin Resource Sharing

By |August 7, 2025|Blog|

Welcome to the second installment of our "Attacks You Should Know About" series! This blog provides valuable insights for both novice and experienced cybersecurity professionals on common attacks and vulnerabilities. Today, we examine cross-origin resource ...

Understanding #s in C Programming Part 1: Macros and Conditionals

By |August 7, 2025|Blog|

Within C programming, there are many commands that start with the # symbol that are used as placeholders for the C preprocessor. These hash-directives can be used to define tokens for substitution, pull in header ...

Go to Top