Aboelhamd Abdellatifaboelhmd.com·Dec 11, 2024The Rise of Fileless Cyber Attacks: What You Need to KnowIn the ever-evolving world of cybersecurity, one type of attack has gained notoriety for its ability to evade traditional defenses: fileless attacks. These stealthy incursions have shifted the paradigm of cyber threats by exploiting legitimate tools ...Discuss#FilelessAttacks
Ahmed Razaahmedrazadev.hashnode.dev·Nov 25, 2024The Importance of Systems Like Cloudflare in Web DevelopmentIn the world of web development, the role of infrastructure and performance optimization cannot be overstated. As websites grow in complexity and scale, developers face increasing challenges in ensuring their sites remain fast, secure, and highly ava...Discusscloudflare
J3bitokjebitok.hashnode.dev·Nov 16, 2024Cyber Defense: Eviction (TryHackMe)In this article, I will write an Eviction: Understanding the Adversary write-up. Sunny is a SOC analyst at E-corp, which manufactures rare earth metals for government and non-government clients. She receives a classified intelligence report that info...Discusseviction
J3bitokjebitok.hashnode.dev·Nov 16, 2024Cyber Defense: Summit (TryHackMe)In this article, I will write a Summit Challenge write-up. For a better understanding of this room, you can refer to the Medium article. Objective After participating in one too many incident response activities, PicoSecure has decided to conduct a...Discusssummit
J3bitokjebitok.hashnode.dev·Nov 11, 2024Cyber Defense Frameworks: Diamond Model (TryHackMe)In this article, I will write a Diamond Chain write-up: The Basics that covers Adversary, Victim, Capability, Infrastructure, Event Meta Features, Socio-Political Component, Technology Component, and Practice Analysis. What is the term for a person/...Discussdiamond-model
J3bitokjebitok.hashnode.dev·Nov 11, 2024Cyber Defense Frameworks: Unified Kill Chain (TryHackMe)In this article, I will write a Unified Kill Chain write-up: The Basics that covers What is a “Kill Chain”, What is “Threat Modelling”, Introducing the Unified Kill Chain, Phase: In (Initial Foothold), Phase: Through (Network Propagation), Phase: Out...Discuss#CyberDefense
J3bitokjebitok.hashnode.dev·Nov 9, 2024Cyber Defense Frameworks: SOC Level 1 (TryHackMe)In this article, I will write a Pyramid of Pain write-up: The Basics that covers Hash Values, IP Addresses, Domain Names, Host Artifacts, Network Artifacts, Tools, TTPs, and a Practical of the Pyramid of Pain. Analyse the report associated with the ...Discuss#CyberDefense
Shivain Sharmashivain.hashnode.dev·Nov 3, 2024Key Strategies for Digital Privacy: A Guide to Zero Trust ArchitectureEver wondered how companies are locking down sensitive data and keeping hackers at bay in today’s digital age? That’s where Zero Trust Architecture (ZTA) comes in—a revolutionary approach that’s reshaping how organizations protect their networks. Ins...Discuss·3 likesdigital privacy
Aboelhamd Abdellatifaboelhmd.com·Sep 30, 2024Introduction to Cybersecurity: Why It MattersIn today’s interconnected world, cybersecurity has become more critical than ever. As our lives become increasingly digital, the risks associated with cyber threats grow exponentially. This article explores the importance of cybersecurity, recent sta...DiscussSecurityInsights
YERRA VENKAT PRAVEEN MALLIKvenkatpraveens06.hashnode.dev·Aug 7, 2024How AI is Shaping the Future of CybersecurityArtificial Intelligence (AI) is revolutionizing cybersecurity by enhancing threat detection and response capabilities. Traditional methods often fall short against sophisticated cyber threats, but AI's ability to analyze vast amounts of data in real-...Discuss#cybersecurity