Category blog

Yara writeup – TryHackMe

YARA (Yet Another Ridiculous/Recursive Acronym) is a great open-source resource (and language) designed for creating and sharing pattern matching rules. One of the most popular uses for YARA rules is to identify and classify files or data based on specific…

Email aliases, online identity and threat modelling

Until not long ago, I didn’t think twice about sharing my old (then main) Gmail email address with literally any and every service I’d come across in the internet. A 10% discount for sharing my email with this questionable eCommerce…

How to migrate your data from TV Time to Trakt

I watch a lot of TV, and for a few years now I’ve been using some of those tracking applications where you can follow shows, mark them as watch, comment and rate episodes and follow any newer releases and release…

Fixing ERR_TOO_MANY_REDIRECTS in WordPress

I have been playing with WordPress on and off for many years now, and although I’m not a heavy plugin user (The less plugins you use, the less windows you leave open to potential vulnerabilities), one of the plugins I…

I joined the (ISC)² on an exam writing workshop

Recently, I had the amazing opportunity to collaborate with (ISC)², the renowned cybersecurity nonprofit that specializes in cybersecurity certifications. Shortly after earning my Certified in Cybersecurity credential and becoming an (ISC)² member, I was invited to join them as a…

Email authentication through SPF, DKIM and DMARC

Email is flawed, and threat actors know this very well. Email was originally created over 50 years ago, and whilst it has evolved quite a lot during this time, email is still far from being as secure as other communication…