Cyber yoga – breathe in security patches, breathe out vulnerabilities
The second principle of Zero Trust security encourages us to be pessimistic. Click on the sketch to read the story.
Understand the three-way TCP handshake process with a movie night proposal and how the SYN Flood attack spoils the plan.
Are teens the mastermind of cybercriminal group “Lapsus$”. Too early, but here are some interesting findings so far. Click on the sketch to read the story.
Cyber gang Lapsus$ breached 190 GB of Samsung Galaxy source code and leaked via Torrent. Is it just the beginning of a new data extortion crime? Click on the sketch to read the story.
A cyber comic satire that revisits Albert Einstein’s quote on world war 3. Click on the sketch to read the story.
A Filipino student didn’t have money to pay for his Internet service. So, he created a virus. Click on the sketch to read a story.