Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner
Book Review: Red Team Development and Operations by Joe Vest and James Tubberville

Uday Mittal February 24, 2021

Book Review: Red Team Development and Operations by Joe Vest and James Tubberville

I recently picked up this book, Red Team Development and Operations by Joe Vest and James Tubberville, while searching for material to read on Red Teaming. While this is not the only book on the subject, I was intrigued by the ‘Zero-Day Edition’ (along with this content, of course). Also, it was published recently (at […]

Filed Under: Book Reviews, Good Reads, Non-Fiction Tagged With: Cybersecurity books, red teaming

Good Read: The Snowden Files

Uday Mittal June 26, 2015 Leave a Comment

Good Read: The Snowden Files

When I first heard about the PRISM mass surveillance program, conducted by the United States National Security Agency (NSA), I thought it was an hoax. Primarily, because up until then that kind of stuff belonged to Hollywood movies only, at least for the uninformed me. But as the news snowballed and caught the attention of […]

Filed Under: Good Reads, Non-Fiction Tagged With: Edward Snowden, Luke Harding, Mass Surveillance, The Snowden Files

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory Active directory lab adsecurity adsi adsisearcher Android attack active directory awareness blue whale challenge Certification CISSP command and control crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden ellitedevs forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team Risk Management Social Media user enumeration Wifi Windows

Top Posts

  • Web App Pentesting using BodgeIt Store (Part 1)
    Web App Pentesting using BodgeIt Store (Part 1)
  • Are you sharing sensitive information over WhatsApp?
    Are you sharing sensitive information over WhatsApp?
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress