Jeremyah JoelCyber Resilient Architecture: Open Source Security and Supply Chain AttacksThe Rising Tide of Supply Chain AttacksOct 24Oct 24
Jeremyah JoelCyber Resilient Architecture: Leveraging Cyber Threat Intelligence to Combat Credential Theft…Hi all! It’s been a while since I’ve shared technical insights on Medium, and today’s deep dive into Cyber Threat Intelligence (CTI) from a…Sep 25Sep 25
Jeremyah JoelRunner Up at BPJS Kesehatan Security HackathonMy Expience Winning Indonesia Biggest Security Hackathon!Feb 9, 2022Feb 9, 2022
Jeremyah JoelOSCP Experience — How I Earned 100 Points in 10 HoursHi everyone, today I’m going to tell you my story on how I was able to root all 5 machines in my OSCP Exam and earned 100 points in just…Oct 2, 2021Oct 2, 2021
Jeremyah JoelRemote Code Execution — Bypassing WAF and FiltersInjection is always a thing. Existing and settle well in OWASP Top 10 Security vulnerabilities 2007, 2010, 2013 and 2017 version in which…Nov 8, 2020Nov 8, 2020
Jeremyah JoelPublic Password BreachA data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.Apr 10, 2020Apr 10, 2020