Yaksas Security
Cybersecurity Research
Launched 8 months ago
Subscribe
By subscribing, I agree to Substack’s
Terms of Use
and acknowledge its
Information Collection Notice
and
Privacy Policy
No thanks
Yaksas Security
Subscribe
Sign in
Home
Red Team Training
Cyber Safety Initiatives
GitHub
Archive
About
Seven Common Cryptography Attacks
Discover the seven most common cryptography attacks, including brute force, ciphertext-only, and differential cryptanalysis, and how they impact…
Oct 18, 2024
•
Yaksas Security
Share this post
Yaksas Security
Seven Common Cryptography Attacks
Copy link
Facebook
Email
Notes
More
The Shared Responsibility Model and Its Challenges
The shared responsibility model is a fundamental framework that delineates the security obligations of cloud service providers (CSPs) and their…
Oct 11, 2024
•
Yaksas Security
Share this post
Yaksas Security
The Shared Responsibility Model and Its Challenges
Copy link
Facebook
Email
Notes
More
Mona.py for exploit devs: 6 must know commands
Six mona.py commands I regularly use during exploit development. They help me speed up the entire process. Watch the video for demonstration.
Oct 19, 2024
•
Yaksas Security
Share this post
Yaksas Security
Mona.py for exploit devs: 6 must know commands
Copy link
Facebook
Email
Notes
More
Security Considerations in Multi-Cloud Architecture
A multi-cloud strategy involves utilizing services from multiple cloud providers, such as AWS, Google Cloud, and Microsoft Azure, to leverage the best…
Oct 13, 2024
•
Yaksas Security
Share this post
Yaksas Security
Security Considerations in Multi-Cloud Architecture
Copy link
Facebook
Email
Notes
More
Components of Cloud Security Architecture
A cloud security architecture encompasses a comprehensive framework of tools, technologies, and processes designed to safeguard cloud environments from…
Oct 12, 2024
•
Yaksas Security
Share this post
Yaksas Security
Components of Cloud Security Architecture
Copy link
Facebook
Email
Notes
More
Most Popular
View all
Immunity Debugger for Exploit Devs
Sep 22, 2024
•
Yaksas Security
Share this post
Yaksas Security
Immunity Debugger for Exploit Devs
Copy link
Facebook
Email
Notes
More
Red Team Operations Attack Lifecycle
Sep 29, 2024
•
Yaksas Security
Share this post
Yaksas Security
Red Team Operations Attack Lifecycle
Copy link
Facebook
Email
Notes
More
Keep This in Mind While Searching for a CISO
Sep 15, 2024
•
Yaksas Security
Share this post
Yaksas Security
Keep This in Mind While Searching for a CISO
Copy link
Facebook
Email
Notes
More
PoshC2: A Red Teamer's Notes
Sep 29, 2024
•
Yaksas Security
Share this post
Yaksas Security
PoshC2: A Red Teamer's Notes
Copy link
Facebook
Email
Notes
More
Cybersecurity Leadership
See all
The Data Breach That Changed Everything
The 2013 Target data breach redefined cybersecurity forever, making it a board-level concern, leading to CISO hirings, and accelerating chip-and-PIN…
Oct 9, 2024
•
Yaksas Security
Share this post
Yaksas Security
The Data Breach That Changed Everything
Copy link
Facebook
Email
Notes
More
Where Should a CISO Report in an Organization?
Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity…
Oct 5, 2024
•
Yaksas Security
Share this post
Yaksas Security
Where Should a CISO Report in an Organization?
Copy link
Facebook
Email
Notes
More
How CISOs and Corporate Audit Teams Can Drive Cybersecurity Success
A CISO partnering with the audit team can drive executive support for cybersecurity programs, secure funding, and strengthen organisational risk…
Oct 2, 2024
•
Yaksas Security
Share this post
Yaksas Security
How CISOs and Corporate Audit Teams Can Drive Cybersecurity Success
Copy link
Facebook
Email
Notes
More
Recent posts
See all
Key Cloud Security Challenges
Organizations face numerous obstacles when implementing cloud security controls, which can hinder the effectiveness of their cloud strategies.
Oct 10, 2024
•
Yaksas Security
Share this post
Yaksas Security
Key Cloud Security Challenges
Copy link
Facebook
Email
Notes
More
The Data Breach That Changed Everything
The 2013 Target data breach redefined cybersecurity forever, making it a board-level concern, leading to CISO hirings, and accelerating chip-and-PIN…
Oct 9, 2024
•
Yaksas Security
Share this post
Yaksas Security
The Data Breach That Changed Everything
Copy link
Facebook
Email
Notes
More
5 Cloud Security Certifications Worth Pursuing
These vendor agnostic cloud security certifications offer a versatile and comprehensive approach to cloud security, enabling professionals to apply…
Oct 8, 2024
•
Yaksas Security
Share this post
Yaksas Security
5 Cloud Security Certifications Worth Pursuing
Copy link
Facebook
Email
Notes
More
Yaksas Security
Cybersecurity Research
Subscribe
Yaksas Security
Subscribe
About
Archive
Sitemap
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts