Unlocking WPA2 Wi-Fi Networks: A Step-by-Step Guide
wifi
hacking
Flipper Zero
hashcat
Let's understand how to crack WPA2 Wi-Fi networks using the Flipper Zero and Hashcat.
Lateral Movement and Privilege Escalation in Kubernetes: A Practical Case Study
A real-world Kubernetes attack path: command injection, internal reconnaissance, Grafana exploitation, and service-account abuse.
Email Security Explained: SMTP, SPF, DKIM, DMARC, and BIMI
Email remains a primary channel for exchanging information. However, the convenience of email also opens doors to potential security threats.
Why DevOps Teams Need Security Ownership
Have you ever heard of DevSecOps? probably. But can you assure that you understand what it is and what are its daily challenges, would you imagine that its main challenge is actually: you
Why Go Is Great for Security Tooling
A years ago, I did a quick intervention in a cybersecurity conference. I talked about golang and how it can be useful for hackers. At the time, I was a beginner in golang, but I was already convinced that it was a language that could be useful for hackers. Severals cybersecurity projects and tools developped, I'm still convinced. Here is why.
Microservices Architecture: Benefits, Trade-offs, and Communication Patterns
microservice
architecture
DevOps
During my studies as a DevOps engineer, I had the chance to get involved in many concepts and challenges around the web, from the architecture of an application to the management of its infrastructure and of course its development. Today, I want to share with you what I learned from this experience and what I retain from this development approach.