Evolution of The World Wide Web (WWW)

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

The World Wide Web (WWW) has arguanble gone through mind-blowing ammounts transformation since its inception in 1989. From a modest

Read more

Google Open-Source Vulnerability Scanning Tool

The Open Source Vulnerability (OSV) database’s front-end interface, OSV-Scanner, was made available by Google in December 2022. The OSV database

Read more

InfoSec – A Newbie Guide – InfoSecurity

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Information security, also known as cybersecurity, is the practice of protecting sensitive information from unauthorized access, use, disclosure, disruption, modification,

Read more

WATCH: Top 5 CyberSecurity Trends To Expect In 2023

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Cybersecurity is a fast-evolving area. Here, we look at the most important trends to watch out for in 2023, including

Read more

Footprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]

In this video, you will learn how to footprint firewalls on a target. This lesson comes from Module 1, so

Read more

Brute-Forcing Two-Factor Authentication | Exploiting Authentication and Access Control Mechanisms with Burp Suite [FREE COURSE CONTENT]

In this video tutorial, you will see how to bypass multi-factor authentication with brute-force attacks. It is a part of

Read more

Top Compromised Passwords of 2022

The passwordless future has not arrived yet. Until then, we are stuck with one of the most challenging features of

Read more

How to Run Threat Intelligence Analysis and Malware Research (Without Spending a Dime)

In this post, I will walk you step-by-step through techniques that will enable you to run threat intelligence analysis and research malware

Read more

5+ Things to teach your kids about Social Media

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

With children now back at school, it’s time to think about social media, and their use of it. Are they

Read more

How to request a CVE: From vulnerability discovery to disclosure

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

What is a CVE? A CVE, meaning Common Vulnerabilities and Exposure, is a publicly reported vulnerability in software products. Vulnerabilities

Read more