Yaksas Security
Cybersecurity Research
Launched a year ago
Subscribe
Error
By subscribing, I agree to Substack’s
Terms of Use
and acknowledge its
Information Collection Notice
and
Privacy Policy
No thanks
Yaksas Security
Subscribe
Sign in
Home
Red Team Training
Cyber Safety Initiatives
GitHub
Archive
About
Seven Common Cryptography Attacks
Discover the seven most common cryptography attacks, including brute force, ciphertext-only, and differential cryptanalysis, and how they impact…
Oct 18, 2024
•
Yaksas Security
The Shared Responsibility Model and Its Challenges
The shared responsibility model is a fundamental framework that delineates the security obligations of cloud service providers (CSPs) and their…
Oct 11, 2024
•
Yaksas Security
Mona.py for exploit devs: 6 must know commands
Six mona.py commands I regularly use during exploit development. They help me speed up the entire process. Watch the video for demonstration.
Oct 19, 2024
•
Yaksas Security
Security Considerations in Multi-Cloud Architecture
A multi-cloud strategy involves utilizing services from multiple cloud providers, such as AWS, Google Cloud, and Microsoft Azure, to leverage the best…
Oct 13, 2024
•
Yaksas Security
Components of Cloud Security Architecture
A cloud security architecture encompasses a comprehensive framework of tools, technologies, and processes designed to safeguard cloud environments from…
Oct 12, 2024
•
Yaksas Security
Most Popular
View all
Immunity Debugger for Exploit Devs
Sep 22, 2024
•
Yaksas Security
Red Team Adversary Emulation Course
Sep 20, 2024
•
Yaksas Security
Red Team Operations Attack Lifecycle
Sep 29, 2024
•
Yaksas Security
PoshC2: A Red Teamer's Notes
Sep 29, 2024
•
Yaksas Security
Cybersecurity Leadership
See all
The Data Breach That Changed Everything
The 2013 Target data breach redefined cybersecurity forever, making it a board-level concern, leading to CISO hirings, and accelerating chip-and-PIN…
Oct 9, 2024
•
Yaksas Security
Where Should a CISO Report in an Organization?
Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity…
Oct 5, 2024
•
Yaksas Security
How CISOs and Corporate Audit Teams Can Drive Cybersecurity Success
A CISO partnering with the audit team can drive executive support for cybersecurity programs, secure funding, and strengthen organisational risk…
Oct 2, 2024
•
Yaksas Security
Recent posts
See all
Key Cloud Security Challenges
Organizations face numerous obstacles when implementing cloud security controls, which can hinder the effectiveness of their cloud strategies.
Oct 10, 2024
•
Yaksas Security
The Data Breach That Changed Everything
The 2013 Target data breach redefined cybersecurity forever, making it a board-level concern, leading to CISO hirings, and accelerating chip-and-PIN…
Oct 9, 2024
•
Yaksas Security
5 Cloud Security Certifications Worth Pursuing
These vendor agnostic cloud security certifications offer a versatile and comprehensive approach to cloud security, enabling professionals to apply…
Oct 8, 2024
•
Yaksas Security
Yaksas Security
Cybersecurity Research
Subscribe
Error
Yaksas Security
Subscribe
Error
About
Archive
Sitemap
ErrorError
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts