top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
-
Nov 25, 20231 min read
Understanding Threat Classifications
Known Threats Known threats are those that cybersecurity experts can identify using basic signature or pattern matching. Security systems...
9 views0 comments
![Security Intelligence Cycle: Safeguarding Digital Fortresses](https://static.wixstatic.com/media/5fb032_f2c7dc71a80d4ebd91eec3b8bd3f4b39~mv2.png/v1/fill/w_383,h_288,fp_0.50_0.50,q_95,enc_auto/5fb032_f2c7dc71a80d4ebd91eec3b8bd3f4b39~mv2.webp)
-
Nov 24, 20232 min read
Security Intelligence Cycle: Safeguarding Digital Fortresses
During my pursuit of the CYSA (Cybersecurity Analyst) certification, I gained insights into the pivotal role played by the Security...
30 views0 comments
-
Nov 22, 20232 min read
Cyber Kill Chain vs. MITRE ATT&CK® Framework
I will try to explain in easiest way. Cyber Kill Chain and the MITRE ATT&CK® Framework, stand as fundamental models in this arena, each...
22 views0 comments
-
Nov 20, 20232 min read
Hayabusa.exe: Essential Commands for In-depth Log Analysis
Hayabusa, the log analysis tool developed by the Yamato Security group, promises an unparalleled depth of investigation into Windows...
340 views0 comments
![Hayabusa: A Powerful Log Analysis Tool for Forensics and Threat Hunting](https://static.wixstatic.com/media/5fb032_1a847d06f49d4c6d9217484b7c767d8c~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_1a847d06f49d4c6d9217484b7c767d8c~mv2.webp)
-
Nov 19, 20232 min read
Hayabusa: A Powerful Log Analysis Tool for Forensics and Threat Hunting
If presented with the choice between a chainsaw or any other log analysis tool versus Hayabusa, I would opt for Hayabusa. This preference...
194 views0 comments
-
Nov 18, 20231 min read
Chainsaw.exe :- commands
To perform a basic analysis in Chainsaw, you can start with below commands: To do (Search) analysis of log using words: Using the command...
58 views0 comments
![Chainsaw: Streamlining Log Analysis for Enhanced Security Insights](https://static.wixstatic.com/media/5fb032_224d8330ccc34f31b8d2976ddaa0e705~mv2.png/v1/fill/w_454,h_117,fp_0.50_0.50,q_95,enc_auto/5fb032_224d8330ccc34f31b8d2976ddaa0e705~mv2.webp)
-
Nov 17, 20232 min read
Chainsaw: Streamlining Log Analysis for Enhanced Security Insights
In today's cybersecurity landscape, log analysis stands as a critical pillar in identifying potential threats and fortifying defenses....
84 views0 comments
![OS Forensics by PassMark: A Game-Changer in Digital Forensics](https://static.wixstatic.com/media/5fb032_a49e7ffce6444c558a93fe4682779689~mv2.png/v1/fill/w_418,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_a49e7ffce6444c558a93fe4682779689~mv2.webp)
-
Nov 15, 20232 min read
OS Forensics by PassMark: A Game-Changer in Digital Forensics
One tool stands out remarkably from my inventory list is : OS Forensics by PassMark. OS Forensics is a comprehensive, non-free digital...
45 views0 comments
![Cyber Triage: Another Powerful Investigation tool](https://static.wixstatic.com/media/5fb032_2aacef8287124cb1b85230873cbc87b6~mv2.png/v1/fill/w_371,h_97,fp_0.50_0.50,q_95,enc_auto/5fb032_2aacef8287124cb1b85230873cbc87b6~mv2.webp)
-
Nov 12, 20232 min read
Cyber Triage: Another Powerful Investigation tool
Well another tool in my inventory that has garnered my attention is Cyber Triage. If i start with overview Cyber Triage provide...
39 views0 comments
![FireEye Redline: A Powerful Endpoint Investigation Tool](https://static.wixstatic.com/media/5fb032_81ae041310b045cdb996c0b0a083fa04~mv2.png/v1/fill/w_454,h_326,fp_0.50_0.50,q_95,enc_auto/5fb032_81ae041310b045cdb996c0b0a083fa04~mv2.webp)
-
Nov 11, 20232 min read
FireEye Redline: A Powerful Endpoint Investigation Tool
Introduction: I will start with Intro, FireEye Redline is a free endpoint security tool for detecting and investigating security...
68 views0 comments
-
Nov 9, 20231 min read
Best Practices Companies must follow
-- Promote use of strong, unique passwords and MFA to protect accounts -- Emphasize the importance of keeping system and software up to...
4 views0 comments
-
Nov 8, 20231 min read
Recommended Incident Response Steps
"I have identified a series of strategic actions that can be effectively employed across diverse incident scenarios after attack or while...
29 views0 comments
-
Nov 7, 20232 min read
My Views on SIEM vs EDR (Hiring companies neglecting candidates with EDR experience)
A topic that frequently surfaces is the comparison between Endpoint Detection and Response (EDR) and Security Information and Event...
11 views0 comments
-
Nov 4, 20232 min read
Experience of working with Ransomware
Ransomware attacks have become increasingly prevalent in recent years, posing a significant threat to individuals and organizations...
10 views0 comments
-
Oct 23, 20231 min read
"Unwinding with Series: Your Ticket to Relaxation"
In the hustle and bustle of our daily lives, it's crucial to find those moments of reprieve, those little escapes that transport us far...
3 views0 comments
-
Oct 17, 20231 min read
My IELTS Journey: Striving for Success Abroad
Have you ever felt a burning desire to explore the world, immerse yourself in different cultures, and kickstart a career on foreign soil?...
3 views0 comments
-
Oct 10, 20231 min read
Job Hunting
Job hunting is never an easy task, but when you decide to take your career to an international level, the challenges can become even more...
4 views0 comments
-
Sep 21, 20231 min read
Bad News for Indian Peoples
"India stops processing visas for Canadian citizens" If Canada does the same, than it will be trouble for lot of people. India has long...
12 views0 comments
-
Sep 17, 20231 min read
Question Asked to me
On 15 September. A women asked me a question As you are working in Cyber security "Do college students need to have a career plan while...
16 views0 comments
bottom of page