Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Book Review: Practical Social Engineering

Uday Mittal January 7, 2023

Book Review: Practical Social Engineering

One of the important aspects of a red team engagement is Social Egineering (SE). It often paves the way for initial compromise within the target organization network (assuming that the engagement is not following assumed breach methodology). However, most texts on red team engagements delve only briefly into this subject.  Therefore, I chose social engineering […]

Filed Under: Book Reviews Tagged With: Cybersecurity books, red team, Social Engineering

Book Review: Ethical Hacking

Uday Mittal December 10, 2022

Book Review: Ethical Hacking

It’s been some time since I posted my last review, so here comes the next one. This one is for the book Ethical Hacking by Daniel G. Graham. It’s been a couple of months since I finished this book. That’s the time it takes (at least for me) to truly absorb all the information presented […]

Filed Under: Book Reviews Tagged With: cybersecurity, Cybersecurity books, Ethcial hacking, offensive security, Penetration Testing

Book Review: How to Hack Like a LEGEND

Uday Mittal August 15, 2022

Book Review: How to Hack Like a LEGEND

After completing the CCSP certification, I decided to switch gears and pick-up a book focusing on red teaming or adversary emulation. I chose How to Hack Like a LEGEND by Sparc Flow. This book is part of the series, Hack The Planet. The first edition of this book was independently published by the author in […]

Filed Under: Adversary Emulation, Book Reviews Tagged With: adversary emulation, Cybersecurity books, ethical hacking, opsec, red team

Book Review: Cyber Warfare – Truth, Tactics, and Strategies

Uday Mittal June 17, 2022

Book Review: Cyber Warfare – Truth, Tactics, and Strategies

The Humble Bundle recently launched a Cyber Warfare book bundle. The bundle contained 24 books but Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham intrigued me so I decided to pick this book as my next read. It was published in February 2020 by Packt Publishing. This is not the only book […]

Filed Under: Book Reviews Tagged With: cyber-warfare, cybersecurity, Cybersecurity books, deep fakes

Book Review: Practical Threat Intelligence and Data-Driven Threat Hunting

Uday Mittal May 17, 2022 Leave a Comment

Book Review: Practical Threat Intelligence and Data-Driven Threat Hunting

A part of my work involves working with Cyber Threat Intelligence (CTI) so I wanted to brush up my CTI knowledge and learn new concepts (maybe!). I picked up Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Costa-Gazcón (published in October 2020 by Packt Publishing Limited). This book has been on my reading list […]

Filed Under: Book Reviews Tagged With: adversary emulation, Cybersecurity books, MITRE ATT&CK, red team, threat hunting, threat intelligence

Book Review: Red Team Development and Operations by Joe Vest and James Tubberville

Uday Mittal February 24, 2021

Book Review: Red Team Development and Operations by Joe Vest and James Tubberville

I recently picked up this book, Red Team Development and Operations by Joe Vest and James Tubberville, while searching for material to read on Red Teaming. While this is not the only book on the subject, I was intrigued by the ‘Zero-Day Edition’ (along with this content, of course). Also, it was published recently (at […]

Filed Under: Book Reviews, Good Reads, Non-Fiction Tagged With: Cybersecurity books, red teaming

Book Review: Container Security by Liz Rice

Uday Mittal February 10, 2021

Book Review: Container Security by Liz Rice

I recently came across this book, Container Security by Liz Rice, while searching for material to read on how to secure containerized applications. This was the only book I could find on the topic, so I picked it up without thinking further. It was published in April 2020. Content overview The book’s tagline, “Fundamental Technology […]

Filed Under: Book Reviews Tagged With: container security, Cybersecurity books

Book Review: Web Application Security by Andrew Hoffman

Uday Mittal August 29, 2020 Leave a Comment

Book Review: Web Application Security by Andrew Hoffman

I recently came across this book, Web Application Security by Andrew Hoffman, while searching for material to read on how to secure web applications. There are many books available on this topic. I picked this one specifically because of it’s recent publication date. It was published in March 2020 (about 5 month back, at the […]

Filed Under: Book Reviews Tagged With: Cybersecurity books, web application security

Book Recommendation: The Florentine Deception

Uday Mittal September 11, 2017 Leave a Comment

Book Recommendation: The Florentine Deception

I came across The Florentine Deception in the Cybersecurity Canon List. It was listed as a gateway book for 2016. Written by, Carey Nachenberg, co-inventor of Norton Antivirus, it is a suspense thriller novel with cybersecurity as an underlying theme. It is one of those cybersecurity focused novels which amalgamate the two worlds in a […]

Filed Under: Fiction, Good Reads Tagged With: Cybersecurity books, Cybersecurity Cannon, Norton Antivirus

The Cybersecurity Canon Project

Uday Mittal August 15, 2015 Leave a Comment

The Cybersecurity Canon Project

One thing any Cyber Security Professional crave is good literature on the subject. While there are many books that cover the basics and introduce the reader to the field, there are few which have the potential to spark a debate. My search for such books led me to Cybersecurity Canon list. Cybersecurity Canon Project was […]

Filed Under: Good Reads Tagged With: Cybersecurity books, Cybersecurity Cannon, palo alto networks, Rick Howard

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress