Cybersecurity & Hacking

Learning to defend and attack systems the ethical way — tools, labs, walkthroughs, and principles.

Padlock resting on a laptop keyboard, representing password security and self-hosted credential management

How to Install Vaultwarden with Docker (Self-Hosted Bitwarden Alternative)

How to Install Vaultwarden with Docker (Self-Hosted Bitwarden Alternative) In December 2022, LastPass disclosed that attackers had stolen encrypted password vaults for millions of users. Not metadata. Not email addresses. The actual vaults. The ones containing every password, every note, every saved card. LastPass assured everyone that vaults were safe as long as users had […]

How to Install Vaultwarden with Docker (Self-Hosted Bitwarden Alternative) Read More »

How to Prevent an Intune Bulk Wipe (and Detect One Before It’s Too Late)

This week a global medical technology company had their Microsoft tenant compromised. The attackers didn’t deploy custom malware. They logged into the Intune admin console and used the built-in device management tools to trigger a bulk wipe across the entire managed device fleet. From the field: This came from a real incident. A client had

How to Prevent an Intune Bulk Wipe (and Detect One Before It’s Too Late) Read More »

Scroll to Top