Our very own patchwork talks about conducting a Physical Security Assessment for SecureState‘s Beer:30 web series.
In the first post, we created our own malware lab with some basic tools. Now we’re going to use someone else’s sandbox. […]
When my friend first told me that he was phished with a Word document, two infection methods came to mind: either […]