• YouTube
  • LinkedIn
  • WhatsApp
Simone's cybersecurity

Simone's cybersecurity

Home
Blog
Courses
About

Uncategorized

  • Book Reflection: Sandworm by Andy Greenberg
    December 17, 2025

    Book Reflection: Sandworm by Andy Greenberg

    Tejwant Singh
  • Mapping Colonial Pipeline Ransomware to MITRE ICS: A Tactical Breakdown
    December 17, 2025

    Mapping Colonial Pipeline Ransomware to MITRE ICS: A Tactical Breakdown

    Tejwant Singh
  • A Satirical Look at the Cybersecurity Reality
    November 26, 2025

    A Satirical Look at the Cybersecurity Reality

    Tejwant Singh
  • Citrix Bleed 2 & Secure Coding: How One Missing Variable Led to a Major Info Leak
    July 30, 2025

    Citrix Bleed 2 & Secure Coding: How One Missing Variable Led to a Major Info Leak

    Tejwant Singh

Categories

Reviews.

News.

Guides.

Deals.

Videos.

Reader Poll.

Features.

Staff Picks.

Game Culture.

Podcast.

Subscribe to our posts. We’ll keep you in the loop.

  • YouTube
  • LinkedIn
  • WhatsApp
Home
Blog
Courses
About

  • Subscribe Subscribed
    • Simone's cybersecurity
    • Already have a WordPress.com account? Log in now.
    • Simone's cybersecurity
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar