Get Our Weekly Blog Sent Straight to Your Inbox
Grant Codak
Recent Posts
Exploiting the Content Filter
Ever wonder how that phishing email slipped by your state-of-the-art mail defenses? These days hackers find it’s not enough just to fool users with URL manipulation techniques. In the past, successful phishing campaigns might have yielded hundreds of...
Practice What you Breach - Incident Response Plan Basics
Plan to fail instead of failing to plan According to a November 2018 Gallup poll, 71% say they frequently or occasionally fear that computer hackers will access their personal, credit card or financial information. The best way to control fear, is to...
The OWASP CTF Results Are In!
Have you ever wondered how it would feel to turn evil for a few hours, legally of course? People from all over the St. Louis did just that on Thursday night. STL-OWASP & STL-Cyber hosted a Capture the Flag (CTF) event at the TREX building in downtown St....
Poisoning the Water Cooler
Have you ever showed up to your workplace and noticed someone new in a faraway corner cube diligently working with implanted earbuds and their eyes fixated forward on their workstation? What goes through your mind? Are they a new intern feverishly...