Phishing Campaign - Operation Solaris
The Silent Heist: Anatomy of a Hypothetical Spear Phishing Campaign What is Spear Phishing? Spear phishing is a hyper-targeted cyberattack where threat actors craft personalized messages to dece...
The Silent Heist: Anatomy of a Hypothetical Spear Phishing Campaign What is Spear Phishing? Spear phishing is a hyper-targeted cyberattack where threat actors craft personalized messages to dece...
I am following Udemy Jason Dion’s course for Security + Social Engineering Manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces. Th...
I am following Udemy Jason Dion’s course for Security + Automation Automatic execution of task without manual involvement Individual tasks Orchestration Coordination of automates tasks for a ...
I am following Udemy Jason Dion’s course for Security + Threat Actors An individual or entity responsible for incidents that impact security and data protection Threat actor attributes : Speci...
What are network devices ? Network device are hardware devices that allows computers to talk to each other over a network, LAN (Local Area Network) or WAN (Wide Area Network). Will come back here ...
NIST Framework National Institute of Standard & Technology Will continue on this topic soon … Check this video out till then : # Cyber Skills: Mastering the Basics Really nice video To get...
I am following Udemy Jason Dion’s course for Security + Fundamentals of Security Three pillars of security : CIA (Confidentiality, Integrity & Availability) Confidentiality : In...
Google cybersecurity cert Been a while since I posted anything. So, I finished my Google Cybersecurity Professional Certificate 2 days back. Here’s my Certificate. This course is really detailed a...
What is a bothy? Randomly, I was doing little exploring online about Scotland in youtube and came across this video Overnight Alone In A Scottish Island Bothy and I found it really interesting. We...
Transitioning professional with a strong foundation in system analysis, automation, and problem-solving. Actively preparing for Security+ certification and self-studying threat intelligence framewo...