loader image
M1-Network Forensics

M1-Network Forensics

Network forensics aims to capture and preserve evidence consistently and policy-based. However, it also faces encryption, data volume, and jurisdiction challenges. This short video explains the key objectives, challenges, and network forensics tools. For related...
M4 The Structure of apk and ipa

M4 The Structure of apk and ipa

Did you know that .apk and .ipa files are actually zip files? In this video, we discuss the structure of these files, which later lay the foundation for conducting spot assessments of mobile apps. For related cybersecurity videos, you may follow our YouTube channel....
Security Alert:RCE Vulnerability

Security Alert:RCE Vulnerability

Security researchers have uncovered a critical vulnerability (CVE-2023-48788) in Fortinet’s FortiClient EMS software, enabling remote code execution. Exploits are already active, urging users to patch versions 7.0 and 7.2 immediately to prevent potential...
Meet Agnas D. Soliman

Meet Agnas D. Soliman

Meet Agnes D. Soliman, our featured #HumansOfCybersecurityPH this week. Reflecting on the evolving landscape, she shares insights on the shift towards inclusivity and opportunity for women in cybersecurity. How open is the cybersecurity industry to women now compared...
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!