learn
Offensive Security Topics
1. Active Directory (AD) Authentication Active Directory (AD) Authentication is a Windows-based system that manages who can access the network (authentication) and what...
Introduction to Active Directory (AD) Active Directory (AD) is a service used in Windows-based networks to manage an organisation’s resources such as users, computers...
💻✨ Explore the Depths of Cybersecurity with “Five Things to Know About SQL Injection”! 🛡️🌐 Dive into our insightful infographic for a comprehensive...
API testing holds a crucial position in the realm of software development, acting as a linchpin for seamless communication and interaction among diverse software...
Exploring the vast landscape of cloud environments like Azure often involves navigating intricate relationships and potential attack paths. Recently, while attempting to...
In today’s interconnected digital landscape, where communication between devices and systems is prevalent, cyber threats like relay attacks pose significant risks...
In the ever-evolving landscape of web security, the specter of DOM-based cross-site scripting (XSS) vulnerabilities looms large, presenting a substantial menace to the...
The Active Directory domain controller (DC) locator serves a vital role in assisting clients to find the nearest domain controller, utilizing diverse methods for this...
In the realm of modern software development, Application Programming Interfaces (APIs) play a pivotal role in enabling seamless communication between diverse software...
Defensive Security Topics
Introduction: In the ever-evolving landscape of cybersecurity, email phishing attacks continue to pose significant threats to individuals and organizations. Recognizing...
In the ever-evolving landscape of cybersecurity, threat hunting has become an indispensable practice for organizations aiming to proactively identify and mitigate...
In the dynamic realm of cybersecurity, the role of a Junior Security Analyst within a Security Operations Center (SOC) holds paramount importance. As a Junior Security...
General Topics
The landscape of Office 365 (O365) and Azure Active Directory (AzureAD) management and security monitoring has witnessed a proliferation of diverse and potent tools...
Microsoft recently announced the resolution of 58 vulnerabilities spread across various products, marking a critical moment in the cybersecurity landscape. Among these...
In an earlier period, businesses relied on dedicated servers for each application they operated. Whenever a new application was needed, a brand-new server was purchased...
Talk to Me
Have any questions? I am always open to talk about your business, new projects, creative opportunities and how I can help you.