Active Directory Best Practices: User, Group, and GPO ManagementIn this Blog, I am going to perform some of operations on Active Directory and their users/computers, that aligns with a typically IT…Oct 14, 2024Oct 14, 2024
The Principle of Least Privilege: A Practical Guide for Cybersecurity ProfessionalsHey Hackers!!!Sep 5, 2024Sep 5, 2024
Cybersecurity Foundation EP:2 — Mastering Risk: A Comprehensive Guide for Digital SecurityHey Hackers !!!Aug 31, 2024Aug 31, 2024
Published inSystem WeaknessThe CIA Triad: A Beginner’s Guide to Information Security | Cybersecurity FoundationsHey Hackers!!!Aug 28, 20241Aug 28, 20241
Windows Security Alert: CVE-2024–38063 Vulnerability ExposedMicrosoft discloses another vulnerability this year, which is identified as CVE-2024–38063 allowing an unauthenticated attacker to send…Aug 22, 2024Aug 22, 2024
Cybersecurity Crisis: What Happened When I Got Hacked and How to Stay SafeIt was a nice sunny day today, In fact it was one of those days when you feel sun rays glistening the entire room, I was enjoying my…Aug 11, 2024Aug 11, 2024
Published inSystem WeaknessWhat are Command and Control center| how covert channels helps !!During an Advanced Persistent Threat (APT) campaign, adversaries must maintain active connections with compromised systems. While the…May 26, 2024May 26, 2024
Intel Reports a Max Severity Bug in Its Software for AI Model CompressionIntel has announced a critical vulnerability in certain versions of its Intel Neural Compressor software, used for AI model compression…May 20, 2024May 20, 2024
Published inSystem WeaknessDNS Tunneling Abuse: The Latest Trend in Tracking and Scanning VictimsAttackers have escalated their exploitation of DNS traffic beyond traditional methods like DNS tunneling. Recent research by Palo Alto…May 14, 2024May 14, 2024
Pyramid of Pain | A conceptual cybersecurity modelA pyramid of pain is a conceptual Cybersecurity model that categorizes IOC Indicator of Compromise and TTC Tactics, Techniques &…Apr 28, 2024Apr 28, 2024