Mattia ZignaleWhat is Threat Intelligence and why your company should work on itThreat intelligence is the process of collecting and analyzing information related to security threats·4 min read·Jul 13, 2023----
Mattia ZignaleinInfoSec Write-upsHow to hide messages with SteganographyQuick study of this wonderful technique·5 min read·Apr 3, 2023----
Mattia ZignaleinInfoSec Write-upsAttacking and securing Docker containersHow to set secure Docker enviroment and reduce risk for Docker attacks·6 min read·Feb 7, 2023----
Mattia ZignaleinInfoSec Write-upsIntroduction to Digital ForensicsDigital forensics is the process of uncovering and interpreting electronic evidence.·8 min read·Jan 12, 2023--1--1
Mattia ZignaleinInfoSec Write-upsVulnhub Doubletrouble: WalkthroughDo not under evaluate this easy machine, it will bring you through…trouble!·6 min read·Oct 16, 2021----
Mattia ZignaleinDark Roast SecurityLight Roast 106: Anonymize With TorAn overview of using Tor for online anonymity.4 min read·Sep 30, 2021----
Mattia ZignaleinInfoSec Write-upsHow LUKS works with Full Disk Encryption in LinuxFull Disk Encryption with LUKS8 min read·Sep 16, 2021--1--1
Mattia ZignaleNotes on CEH — Part 4Certified Ethical Hacker — IDS/Firewall Evasion and Honeypot, Hacking Web Application, SQL Injection6 min read·Sep 1, 2021--1--1
Mattia ZignaleinInfoSec Write-upsHow was my first Web Application Penetration TestAnd why I say this was my first WAPT7 min read·Aug 29, 2021----
Mattia ZignaleNotes on CEH — Part 3Certified Ethical Hacker — Sniffing, Denial of Service, Session Hijacking6 min read·Jul 26, 2021----