Yaksas Security

Yaksas Security

Home
Red Team Training
Cyber Safety Initiatives
GitHub
Archive
About
Mona.py for exploit devs: 6 must know commands
Six mona.py commands I regularly use during exploit development. They help me speed up the entire process. Watch the video for demonstration.
Oct 19, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
Mona.py for exploit devs: 6 must know commands
Seven Common Cryptography Attacks
Discover the seven most common cryptography attacks, including brute force, ciphertext-only, and differential cryptanalysis, and how they impact…
Oct 18, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
Seven Common Cryptography Attacks
Security Considerations in Multi-Cloud Architecture
A multi-cloud strategy involves utilizing services from multiple cloud providers, such as AWS, Google Cloud, and Microsoft Azure, to leverage the best…
Oct 13, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
Security Considerations in Multi-Cloud Architecture
Components of Cloud Security Architecture
A cloud security architecture encompasses a comprehensive framework of tools, technologies, and processes designed to safeguard cloud environments from…
Oct 12, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
Components of Cloud Security Architecture
The Shared Responsibility Model and Its Challenges
The shared responsibility model is a fundamental framework that delineates the security obligations of cloud service providers (CSPs) and their…
Oct 11, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
The Shared Responsibility Model and Its Challenges
Key Cloud Security Challenges
Organizations face numerous obstacles when implementing cloud security controls, which can hinder the effectiveness of their cloud strategies.
Oct 10, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
Key Cloud Security Challenges
The Data Breach That Changed Everything
The 2013 Target data breach redefined cybersecurity forever, making it a board-level concern, leading to CISO hirings, and accelerating chip-and-PIN…
Oct 9, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
The Data Breach That Changed Everything
5 Cloud Security Certifications Worth Pursuing
These vendor agnostic cloud security certifications offer a versatile and comprehensive approach to cloud security, enabling professionals to apply…
Oct 8, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
5 Cloud Security Certifications Worth Pursuing
What is the Cloud Control Matrix (CCM)?
The Cloud Control Matrix (CCM) is a cybersecurity control framework for cloud computing, developed by the Cloud Security Alliance (CSA).
Oct 7, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
What is the Cloud Control Matrix (CCM)?
5 Cloud Security Best Practices
In this article we outline the top 5 cloud security best practices that you should implement, if you are leveraging cloud services for your…
Oct 6, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
5 Cloud Security Best Practices
Where Should a CISO Report in an Organization?
Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity…
Oct 5, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
Where Should a CISO Report in an Organization?
Top Cloud Security Risks
In this article we outline the most critical security risks affecting cloud-based applications.
Oct 4, 2024 • 
Yaksas Security

Share this post

Yaksas Security
Yaksas Security
Top Cloud Security Risks
© 2025 Yaksas Security
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share