Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Book Review: How to Hack Like a GHOST

Uday Mittal December 21, 2022

Book Review: How to Hack Like a GHOST

After completing my last book, I decided to go for another Sparc Flow book. Full disclosure, it had been in my partial read pile for some time (don’t let that reflect on the quality of the book, that’s totally on me). This review is for the book How to Hack Like a GHOST by Sparc […]

Filed Under: Adversary Emulation, Book Reviews Tagged With: adversary emulation, Cloud security, cybersecurity, devops, opsec, red team

Book Review: Ethical Hacking

Uday Mittal December 10, 2022

Book Review: Ethical Hacking

It’s been some time since I posted my last review, so here comes the next one. This one is for the book Ethical Hacking by Daniel G. Graham. It’s been a couple of months since I finished this book. That’s the time it takes (at least for me) to truly absorb all the information presented […]

Filed Under: Book Reviews Tagged With: cybersecurity, Cybersecurity books, Ethcial hacking, offensive security, Penetration Testing

Book Review: Cyber Warfare – Truth, Tactics, and Strategies

Uday Mittal June 17, 2022

Book Review: Cyber Warfare – Truth, Tactics, and Strategies

The Humble Bundle recently launched a Cyber Warfare book bundle. The bundle contained 24 books but Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham intrigued me so I decided to pick this book as my next read. It was published in February 2020 by Packt Publishing. This is not the only book […]

Filed Under: Book Reviews Tagged With: cyber-warfare, cybersecurity, Cybersecurity books, deep fakes

Understand and restrict admin access in your organization

Uday Mittal July 15, 2019 Leave a Comment

Understand and restrict admin access in your organization

In today’s time, providing users with unjustified administrator access on their work systems, could lead to significant business loss. A careless user may download a benign looking file and the next moment you may find yourself battling an organization wide ransomware attack. Here’s a quick guide for small business owners on how to tame this […]

Filed Under: Awareness, Technology Tagged With: administrator access restriction, cybersecurity, Information Security, least privilege, secure access

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • Make Remote Access Your Ally
    Make Remote Access Your Ally
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress