Code Project: CVE Hunter with Cursor AI
A hands-on side project combining AI, CVE databases, and real-time threat intel to simplify vulnerability analysis for cybersecurity professionals.
A hands-on side project combining AI, CVE databases, and real-time threat intel to simplify vulnerability analysis for cybersecurity professionals.
Transforming a 75-cent accounting error into a gripping, true-life cyber-thriller that reveals the surprisingly human origins of digital espionage.
Stored Cross-Site Scripting (XSS) via SVG File Upload in IBM Cloud Pak for Data and IBM Event Streams
Authenticated Remote Code Execution via JDBC Driver Upload in IBM Cloud Pak for Data (CP4D)
Credential Disclosure via Attacker-Controlled Endpoint in IBM Cloud Pak for Data (CP4D)
Sandworm by Andy Greenberg: Unmasking the Cyberwarfare That Changed Everything
What the world’s most famous hacker taught me about digital privacy, online anonymity, and why it all matters more than ever.
WWhat the FBI’s most wanted hacker, Kevin Mitnick had to say and did the impossible.
Ditch the subscriptions—here’s how I use libraries (local and international) to access thousands of books, audiobooks, and even Kindle titles for free.
Browser rendering SSH, VNC and RDP sessions with Apache Guacamole.