Active Directory Best Practices: User, Group, and GPO ManagementIn this Blog, I am going to perform some of operations on Active Directory and their users/computers, that aligns with a typically IT…Oct 14Oct 14
The Principle of Least Privilege: A Practical Guide for Cybersecurity ProfessionalsHey Hackers!!!Sep 5Sep 5
Cybersecurity Foundation EP:2 — Mastering Risk: A Comprehensive Guide for Digital SecurityHey Hackers !!!Aug 31Aug 31
Published inSystem WeaknessThe CIA Triad: A Beginner’s Guide to Information Security | Cybersecurity FoundationsHey Hackers!!!Aug 281Aug 281
Windows Security Alert: CVE-2024–38063 Vulnerability ExposedMicrosoft discloses another vulnerability this year, which is identified as CVE-2024–38063 allowing an unauthenticated attacker to send…Aug 22Aug 22
Cybersecurity Crisis: What Happened When I Got Hacked and How to Stay SafeIt was a nice sunny day today, In fact it was one of those days when you feel sun rays glistening the entire room, I was enjoying my…Aug 11Aug 11
Published inSystem WeaknessWhat are Command and Control center| how covert channels helps !!During an Advanced Persistent Threat (APT) campaign, adversaries must maintain active connections with compromised systems. While the…May 26May 26
Intel Reports a Max Severity Bug in Its Software for AI Model CompressionIntel has announced a critical vulnerability in certain versions of its Intel Neural Compressor software, used for AI model compression…May 20May 20
Published inSystem WeaknessDNS Tunneling Abuse: The Latest Trend in Tracking and Scanning VictimsAttackers have escalated their exploitation of DNS traffic beyond traditional methods like DNS tunneling. Recent research by Palo Alto…May 14May 14
Pyramid of Pain | A conceptual cybersecurity modelA pyramid of pain is a conceptual Cybersecurity model that categorizes IOC Indicator of Compromise and TTC Tactics, Techniques &…Apr 28Apr 28