Blogs
Featured Blogs
Explore our Cyber Security Blog and empower yourself with the tools and expertise necessary to navigate the digital world safely.
All Posts

Unredacted JFK Files Expose Sensitive Information
March 23, 2025

Techniques for Pentesting 2024
July 14, 2024

AutoIt Malware Spreads Vidar Stealer
June 10, 2024

AES in Malware Understanding Lu0Bot
June 4, 2024

Top 25 Penetration Testing Tools (2024)
May 31, 2024

What Does a Security Engineer Do?
May 15, 2024

Europol Hack Exposes Sensitive Data
May 12, 2024

US Sanctions LockBit Ransomware Leader
May 7, 2024

Beware Unregistered Crypto Money Services
May 1, 2024

Love or Lies? New Scam Targets Online Daters
April 29, 2024

Stealing with Script: The Redline Malware
April 28, 2024

Top 5 Deception Tools for Enhanced Cybersecurity
April 27, 2024

GitLab Autocomplete Flaw Exploited for XSS Attacks
April 26, 2024

UK Government Websites Leak Data to Chinese Ad Firm
April 25, 2024

Top 5 Industries Most Vulnerable to Cyberattacks
April 22, 2024

Exploiting Email Verification in Karros Technologies
April 22, 2024

Korean Portal Phishing Scam
April 22, 2024

LabHost Takedown: Major Phishing Platform Disrupted
April 21, 2024

Take Control of Your Cloud: Top Monitoring Tools
April 20, 2024

Hunting Named Pipes with Sysmon
April 19, 2024

Leveraging Large Language Models and AI Against Phishing
April 19, 2024

Q1 2024 Malware Trends Report
April 19, 2024

Microsoft Guides DoD on Zero Trust Strategy
April 18, 2024

Hacked on the Highway: Possible Ways Of Attacking Cars
April 16, 2024
![Ethical Empire Hack The Box: [Medium] OSINT Challenges Writeup](https://ethical-empire.com/wp-content/uploads/elementor/thumbs/image-2-qms3ec4h7yxdm3sh7x5v8rtwaq3760t5hln5hqu8lg.jpeg)
Hack The Box: [Medium] OSINT Challenges Writeup
April 16, 2024

Indian Tech Support Scam Leader Pleads Guilty
April 15, 2024
![Ethical Empire Hack The Box: [Easy]OSINT Challenges Writeup](https://ethical-empire.com/wp-content/uploads/elementor/thumbs/image-1-qmqdp6k1ioc0q4547bc2qruq7fvl6dz9rwmn5y61vo.jpeg)
Hack The Box: [Easy]OSINT Challenges Writeup
April 15, 2024

Car Hacking: Cyber Security in Automotive Industry
April 14, 2024

Beware! Phishing Attacks Targeting Azure Accounts
April 13, 2024

Can You Stop Waterbear? Inside Earth Hundun’s Malware
April 13, 2024

Hackers used Redis to install Meterpreter
April 12, 2024

Healthcare Hacked: Can You Stop the Ransomware Attack?
April 10, 2024

The Growing Chasm: Demand vs. Supply in Cybersecurity
February 19, 2024

Top Cyber Security News
February 17, 2024

Weekly Important Cyber Security News
February 10, 2024

Walkthrough of Advent of Cyber 2023 day 13
December 14, 2023

Walkthrough of Advent of Cyber 2023 Day 12
December 13, 2023

Walkthrough of Advent of Cyber 2023 Day 09
December 10, 2023

Walkthrough Of Advent of Cyber 2023 Day 08
December 9, 2023

Walkthrough of Advent of Cyber 2023 Day 07
December 8, 2023

Walkthrough of Advent of Cyber 2023 : Day 6
December 7, 2023

Walkthrough of Advent of Cyber 2023 : Day 5
December 6, 2023

Walkthrough of TryHackMe’s Advent of Cyber 2023 Day 4
December 4, 2023

advent of cyber 2023 day 2
December 2, 2023

Advent of Cyber 2023 Day – 01
December 1, 2023

Script Categories in Nmap Scripting Engine (NSE)
November 28, 2023

Nmap Output Format Scan for Ethical Hackers – Part 2
November 4, 2023

Nmap Output Format Scan for Ethical Hackers – Part 1
October 28, 2023

Basics you should know before starting Bug Hunting : 1
September 4, 2023

No. 01 Roadmap to Start Your Bug Hunting Career
August 31, 2023

No technology that's connected to the internet is unhackable.
Abhijit Naskar