Group
  • Home
  • Posts
  • Support
  • LinkedIn
  • Q&A

InfoSec

Infosec/Cyber related
Sunsetting Domains

Sunsetting Domains

What to do when you no longer need a domain

Read more
Image by Xixi Carroll - Cup of Tea

Threat Modeling ? Not My Cup of Tea...

Threat Modeling is not everyone's cup of tea, but let's threat model everyone's cup of tea.

Read more
Vertical Vulnerability Managment

Vertical Vulnerability Managment

Vulnerabilities are technology, security and risk vertical, as should be the management.

Read more
Imposter.

Imposter.

Thoughts on Imposter Syndrome, In summation; Imposter Syndrome is the consequence of poor support.

Read more
Group

Emergency Cyber Security Support

The Contractor 🏴‍☠️🧯 © 2025

Connect

Twitter
@thecontractorio
Bluesky
@thecontractorio
Threads
@yosignals
LinkedIn
JC

Pages

  • Support
  • Posts
  • Q&A

Topics

  • OSINT
  • Defence
  • Appsec
  • Entsec
  • Infosec
  • Offsec
  • Exploitation
  • Privacy
  • Random
  • Ideas
  • Archive