Joao Silva

Joao Silva

Dec
25
Bringing harmony to home container management with Portainer

Bringing harmony to home container management with Portainer

Getting a handle on the home server sprawl If you're anything like me, your home network has evolved
3 min read
Dec
16
How a cybercriminal group is targeting recruiters with malware

How a cybercriminal group is targeting recruiters with malware

Recruiters are always looking for the best talent to fill their vacancies. But what if some candidates who apply for
2 min read
Dec
09
What is Credential Stuffing and How to Protect Yourself

What is Credential Stuffing and How to Protect Yourself

Credential stuffing is a type of cyberattack that exploits the reuse of usernames and passwords across different websites and applications.
3 min read
Dec
09
Log4j The pain persists

Log4j The pain persists

The log4j vulnerability, also known as Log4Shell, is a serious flaw in a widely used Java logging library that allows
2 min read
Dec
05
LogoFAIL Vulnerabilities

LogoFAIL Vulnerabilities

Critical bugs allow attackers to bypass Secure Boot and install persistent firmware bootkits on devices. They exploit the image-parsing libraries
1 min read
Dec
03
How I use Cloudflare Zero Trust - Tunnels - to host this blog

How I use Cloudflare Zero Trust - Tunnels - to host this blog

Cloudflare tunnels are a secure and convenient way to connect your web applications to Cloudflare’s network without exposing them
4 min read
Dec
02
Why I chose Checkmk as my monitoring platform?

Why I chose Checkmk as my monitoring platform?

Checkmk is a comprehensive platform for monitoring applications, servers, and networks, whether on-premises or in the cloud. It is equipped
3 min read
Dec
02
Some notes about Google Workspaces Exploits

Some notes about Google Workspaces Exploits

Researchers have found several ways to exploit Google Workspace and Google Cloud Platform features to conduct ransomware, data exfiltration, and
1 min read
Nov
25
Mirai  - botnet

Mirai - botnet

A new Mirai-based botnet exploits a zero-day vulnerability in thousands of routers and cameras from various brands. The vulnerability allows
1 min read
Nov
24
SSHFS: A Small Guide for Ubuntu Users

SSHFS: A Small Guide for Ubuntu Users

SSHFS, or Secure Shell Filesystem, is a powerful tool that uses SSH to enable the mounting of a remote filesystem
1 min read