Breaking Down CVE-2024–55591: Fortinet’s Zero-Day Vulnerability and What It Means for Your SecurityDisclaimer: This blog post is for informational purposes only and should not be considered financial or legal advice.Jan 20Jan 20
How to Spoof Mac Address on Kali LinuxTo become a successful Red Teamer or penetration tester, you need to know techniques that can bypass security measures. One such technique…Nov 18, 2024Nov 18, 2024
How to Encrypt Your Documents in Microsoft Word and ExcelA while ago, one of my friends called me in a frantic state. She had accidentally sent sensitive information in a Word document to someone…Aug 31, 2024Aug 31, 2024
Tryhackme | Intro to Logs | WalkthroughIn this room, you will learn the fundamentals of logging, data sources, collection methods, and principles.Jul 2, 2024Jul 2, 2024
Microsoft Copilot ChatbotI just noticed a new icon at the end of the taskbar on my laptop. When I clicked on it, I discovered it was the Microsoft Copilot chatbot…Apr 3, 2024Apr 3, 2024
Ensuring Business Continuity Through Personnel Succession PlanningIn the fast-paced world of business, where anything can happen, a strong Business Continuity Plan (BCP) becomes vital for every company…Nov 6, 2023Nov 6, 2023
Leveraging Attacker’s Mindset in CybersecurityAs the risks of cyber threats increase, it’s essential to have a good cybersecurity plan in place. By thinking like an attacker, you stay…Aug 31, 2023Aug 31, 2023
Sudo: How I learnt to ask PolitelyHave you ever tried inviting a friend over to someone else’s house without asking the owner(s) for permission? Well, that’s pretty much how…Aug 21, 2023Aug 21, 2023
How to write a Good Cyber Security Incident ReportWhether you are a Cybersecurity expert or just starting out, the importance of writing a good Incident report can not be overemphasized. In…Aug 14, 2023Aug 14, 2023