FreakyDodoActive Directory Best Practices: User, Group, and GPO ManagementIn this Blog, I am going to perform some of operations on Active Directory and their users/computers, that aligns with a typically IT…Oct 14Oct 14
FreakyDodoThe Principle of Least Privilege: A Practical Guide for Cybersecurity ProfessionalsHey Hackers!!!Sep 5Sep 5
FreakyDodoCybersecurity Foundation EP:2 — Mastering Risk: A Comprehensive Guide for Digital SecurityHey Hackers !!!Aug 31Aug 31
FreakyDodoinSystem WeaknessThe CIA Triad: A Beginner’s Guide to Information Security | Cybersecurity FoundationsHey Hackers!!!Aug 281Aug 281
FreakyDodoWindows Security Alert: CVE-2024–38063 Vulnerability ExposedMicrosoft discloses another vulnerability this year, which is identified as CVE-2024–38063 allowing an unauthenticated attacker to send…Aug 22Aug 22
FreakyDodoCybersecurity Crisis: What Happened When I Got Hacked and How to Stay SafeIt was a nice sunny day today, In fact it was one of those days when you feel sun rays glistening the entire room, I was enjoying my…Aug 11Aug 11
FreakyDodoinSystem WeaknessWhat are Command and Control center| how covert channels helps !!During an Advanced Persistent Threat (APT) campaign, adversaries must maintain active connections with compromised systems. While the…May 26May 26
FreakyDodoIntel Reports a Max Severity Bug in Its Software for AI Model CompressionIntel has announced a critical vulnerability in certain versions of its Intel Neural Compressor software, used for AI model compression…May 20May 20
FreakyDodoinSystem WeaknessDNS Tunneling Abuse: The Latest Trend in Tracking and Scanning VictimsAttackers have escalated their exploitation of DNS traffic beyond traditional methods like DNS tunneling. Recent research by Palo Alto…May 14May 14
FreakyDodoPyramid of Pain | A conceptual cybersecurity modelA pyramid of pain is a conceptual Cybersecurity model that categorizes IOC Indicator of Compromise and TTC Tactics, Techniques &…Apr 28Apr 28