Local Tech Repair
Pages
(Move to ...)
Home
Twitter
Feed
▼
Saturday, March 28, 2026
Iran‑Linked Hackers Leak FBI Director’s Emails and Strike U.S. Firm
›
Threat actors tied to Iran recently breached the personal email account of FBI Director Kash Patel and leaked private emails and photos onli...
Friday, March 27, 2026
TikTok Business Account Takeover via AitM Phishing and CAPTCHA Evasion
›
A recent campaign leverages adversary-in-the-middle (AitM) phishing infrastructure to compromise TikTok for Business accounts by combining c...
Wednesday, April 5, 2023
Math Matters in Cybersecurity: How Statistical Analysis and Anomaly Detection Help Protect Networks and Data
›
Cybersecurity is a technical field that requires strong quantitative skills. Math is an important tool in cybersecurity, as it is used to cr...
Thursday, March 30, 2023
Threat Hunting: A Proactive Approach to Cybersecurity
›
Cybersecurity is a constantly evolving field that requires defenders to keep up with the latest threats and techniques of attackers. Traditi...
How to Get Started with Network Forensics: A Practical Guide
›
Network forensics is the science and art of investigating and analyzing network traffic data to discover and recover evidence of cyberattack...
Friday, January 15, 2021
How to think Analytically
›
One of the hardest things in being a defensive security analyst is being able to think with your analytical side of your brain. Training you...
Tuesday, May 21, 2019
What I been up to
›
Figured I would talk about what I been up to these past few years and why I haven't been posting much.
›
Home
View web version