Tag: Hacking
-
Offensive Security Attack Phases and Frameworks
A cheat sheet of offensive security attack types, phases, and frameworks (i.e., Mandiant). Helps find what tools to use in each attack phase.
-
Creating a VM for Malware Analysis in VirtualBox
Learn how to create a sandboxed Windows 10 Virtual Machine (VM) for malware analysis in VirtualBox. Great for CSEC202 at RIT!
-
CDM Gold Optis: Most Innovative and Socially Conscious Technologies at Black Hat
Read about notable companies at Black Hat USA. These companies promote social good, inclusion, and or innovation.
-
CDM Bronze Optis: Innovative Technologies at Black Hat
Read about notable companies at Black Hat USA. These companies promote social good, inclusion, and or innovation.
-
CDM: The Preventable Aspects of the APT40 Microsoft Hack
Read “The Preventable Aspects of the APT40 Microsoft Hack: Open-source, spear-phishing, and network monitoring”‘ by Olivia Gallucci, published in Cyber Defense Magazine.
-
Offensive Security Attacks, Tools, and Techniques
A comprehensive list of offensive security tools, tutorials, and other resources to ensure a successful (legal) hack! Please read disclaimer.
-
Judging Criteria for The Optis Series
I interviewed sixty industry leaders from over forty companies at Black Hat. Here are the 21 companies whose growth I recommend watching.
-
Presentations
This post is a continuously updated timeline of Olivia A. Gallucci’s international, regional, and local cybersecurity presentations.
-
Hacking Competitions
This post is a continuously updated timeline of Olivia A. Gallucci’s participation in international, regional, and local cybersecurity competitions.
You must be logged in to post a comment.