chisom.hashnode.devA Clean Dashboard Doesn't Imply Security: Here's WhyI recently uncovered a concerning security blind spot in an enterprise case study—a flaw that highlights the dangerous assumption many make when it comes to cybersecurity: that 'no alerts' equals 'no threats'. Security is inherently complex, but the ...Feb 1·4 min read
chisom.hashnode.devWhy YARA Rules are Better Than Hashes in Malware DetectionWhen carrying out threat intelligence or threat hunting, one of the most vital necessities is IOCs or IOA. These little fragments are like cues that guide the analyst to a better malware investigation. However, malware are digital files, or better, b...Dec 4, 2025·6 min read
chisom.hashnode.dev5ive Stupid Ways to Avoid PhishingPhishing is terrible. It accounts for most cyber attacks globally, costing billions of dollars annually. First things first, I don’t have a solid reason I used the word ‘stupid’ in the title, maybe because it’s so simple, and requires just a little c...Oct 27, 2025·6 min read
chisom.hashnode.devSecurity by Segmentation: The 3-tiered Network ArchitectureIntroduction Malware infections are known to spread quickly within networks. This is better known as lateral movement. To combat this type of spread, security teams employ a variety of measures, one of which is Network Segmentation. Network Segmentat...Oct 21, 2025·5 min read
chisom.hashnode.devSecurity Blue Team Wireshark Exam WalkthroughIntroduction I recently wrote and passed the Wireshark exam from the Security Blue Team with a 9/9 mark. This was part of my Networking sub-path. It was a deeply practical experience from A to Z, as I had to work with two Wireshark PCAP files...Sep 11, 2025·11 min read