Links
AddThe what, when, why and how of the incoming speed tier
Introduction Netcat is a tool that reads and writes data across network connections, using TCP or UDP protocol. Netcat has been referred to as the TCP/IP / networking swiss army knife. In this article we’ll look at different applications of netcat and how it can be useful in day to day activities of a pentester, security professional, sysadmin etc… If you would like to test out these commands in a lab environment without the need to install them on your own machine have a look at my scenario on CYBERRANGES using the link below.
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
The latest news and resources on cloud native technologies, distributed systems and data architectures with emphasis on DevOps and open source projects.
BGP routing is a core component of the Internet. Learn how BGP works and how it is used to route traffic across the Internet.
AWS introduces a new service to streamline security event response, providing automated triage, coordinated communication, and expert guidance to recover from cybersecurity threats.
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has released a new open-source incident response tool that helps detect signs of malicious activity in Microsoft cloud environments.
GLM-4.6 and Qwen3-coder-480B are available on Ollama’s cloud service with easy integrations to the tools you are familiar with. Qwen3-Coder-30B has been updated for faster, more reliable tool calling in Ollama’s new engine.
Almost a decade ago, my colleague Deepak Singh introduced the AWS Public Datasets in his post Paging Researchers, Analysts, and Developers. I’m happy to report that Deepak is still an important part of the AWS team and that the Public Datasets program is still going strong! Today we are announcing a new take on open […]
Get an exclusive look at brand new cartoons and artwork from cartoonist Gary Larson, creator of the iconic comic strip The Far Side®.
Safely shareable TLS root CA for .internal networks using Name Constraints - nh2/internal-contstrained-pki
Today, the National Institute of Standards and Technology (NIST) announced the first standardization of three cryptography schemes that are immune against the threat of quantum computers, known as post-quantum cryptography (PQC) schemes. With these standards, NIST is encouraging computer system administrators to transition as soon as possible.
Four related algorithms are now ready for use to protect data created and transmitted by the Internet of Things and other electronics
The examples use off-the-shelf commercial technologies, giving organizations valuable starting points
Nobl9 has released an open specification for defining SLOs and, in addition, has defined a repeatable SLO methodology.