Good Day today indeed. Have finally got some time to work on my skills for CIF and writing configuration (YAML scripts) to fetch open source
Morning Everybody!!!! Been working on crafting my skills in Threat Intelligence and available open source system. As the title says I have been working on
Its been long time have updated my blog. Just busy @work and with family and trying to juggle a lot. Have been working a mind
On a pleasant morning I received an email with an doc attachment. The email was not having any text or message. Subject was name of
Merry Christmas and Happy New Year to all ! I thought to start the new year with a blog with regards to spam from Australian
On a Saturday evening I spent some time in upgrading my MacBook Pro with an SSD. The only SSD I had was having security Onion
Information gathering is considered first and most important part before launching any types of attacks, hacking or penetration testing. Information gathering is known by several
TOR – The onion routing – famous for anonymity. TOR browser gives user an edge to be anonymous while browsing. Installing TOR on windows box
Received a interesting email yesterday from Mr. Gordon Hills from London who wanted me to be partner and 5 Million dollars will be released to
Looking for reputation of an IP address is one of the most frequent task of an SOC analyst. There are number of online tools and