Secure Coding MasterClass

Secure Coding What is is Secure Coding? Secure coding is a method where the developer will securing the code from been compromised by the attacker. The best practice for this method is the developer need…

Patch Tuesday June edition

Patch Tuesday Information Lately, Microsoft have been release a new Patch Tuesday with a total of 51 of vulnerabilities for the CVE-listing. In the latest Patch Tuesday, it has included 11 fixes on High vulnerabilities…

Microsoft launch Azure Sphere OS

What is new in Microsoft? Recently, Microsoft has announced that they will launch a linux distro of its own from the simply loving Linux. The purpose is to aimed for the Internet of Things(IoT) market…

Computer Forensic

What is Computer Forensic? Computer Forensic is an progress that include a few step like presenvation, identification, extrction, interpretation, and documentation of computer evidence. When all the evidence is computer analyze, it will be provide…

Prowler – AWS Security Assessment tools

What is Prowler? During my research on how to do an security assessment on the cloud infrastructure, i stumble with Prowler tools which been write by Toni de la Fuente Twitter. The origin of the "Prowler"…

CryptoJacking

Cryptojacking is a new terms that means as a secret use of your computing device to mine cryptocurrency where it normally used on the purpose of be confined to the victim without their awareness. The…

Information Gathering Method

Information gathering is gain any information of an organization or a person . Sometimes, Information Gathering need some "soft skills" and social engineering method. There is a lot of choice of information gathering such as…

Penetration Testing Walkthrough

As most of us know, Penetration Testing will need to follow a few step in order to testing the server and network. Below are the manual that need to be doing during the Penetration Testing…