top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![](https://static.wixstatic.com/media/5fb032_fe9d9276030f4b8cba7978c7a4896dc9~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_fe9d9276030f4b8cba7978c7a4896dc9~mv2.webp)
![Lateral Movement Analysis: Using Chainsaw, Hayabusa, and LogParser for Cybersecurity Investigations](https://static.wixstatic.com/media/5fb032_fe9d9276030f4b8cba7978c7a4896dc9~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_fe9d9276030f4b8cba7978c7a4896dc9~mv2.webp)
-
Jan 69 min read
Lateral Movement Analysis: Using Chainsaw, Hayabusa, and LogParser for Cybersecurity Investigations
A few days ago, I received a request through my website from someone working on an incident response case. He mentioned a situation...
188 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne(P9- Settings): A Practical Guide/An Practical Training](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Jan 32 min read
SentinelOne(P9- Settings): A Practical Guide/An Practical Training
The Settings  section in the SentinelOne Console is your central hub for configuration and management. Here's a detailed breakdown of its...
38 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne (P8- SentinelOne Automation) :Guide / Training to Forensic Collection, KAPE Integration, Running Script and Incident Response](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Jan 18 min read
SentinelOne (P8- SentinelOne Automation) :Guide / Training to Forensic Collection, KAPE Integration, Running Script and Incident Response
SentinelOne’s DFIR capabilities are a standout feature, making it a must-have tool for forensic analysts. Let me walk you through how...
74 views0 comments
![](https://static.wixstatic.com/media/5fb032_812711b1c6d44cd2a8184f09467eeaef~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_812711b1c6d44cd2a8184f09467eeaef~mv2.webp)
![Welcoming the New Year: A Time for New Beginnings and Endless Possibilities](https://static.wixstatic.com/media/5fb032_812711b1c6d44cd2a8184f09467eeaef~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_812711b1c6d44cd2a8184f09467eeaef~mv2.webp)
-
Jan 1, 20252 min read
Welcoming the New Year: A Time for New Beginnings and Endless Possibilities
As we close the chapter on another year, it’s time to look ahead with excitement, hope, and optimism. The New Year is not just a date on...
9 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne(P7- Activity/Reports): A Practical Guide/An Practical Training](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Dec 30, 20242 min read
SentinelOne(P7- Activity/Reports): A Practical Guide/An Practical Training
Let’s dive into two key sections of SentinelOne’s console: the Activity Tab  and the Reports Tab . Activity Tab: The Console’s Audit Log...
72 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne(P6- ISPM/Application Management): A Practical Guide/An Practical Training](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Dec 27, 20243 min read
SentinelOne(P6- ISPM/Application Management): A Practical Guide/An Practical Training
Before diving into the new chapter on Applications , I want to highlight Identity . While these features are undoubtedly promising, I...
41 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne(P5- Incidents): A Practical Guide/An Practical Training](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Dec 23, 20246 min read
SentinelOne(P5- Incidents): A Practical Guide/An Practical Training
When it comes to cybersecurity, Incidents  in SentinelOne is where most of the action happens. This is the go-to place for SOC analysts...
74 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne(P4- Sentinels): A Practical Guide/An Practical Training](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Dec 20, 202412 min read
SentinelOne(P4- Sentinels): A Practical Guide/An Practical Training
Welcome back to the SentinelOne journey! Today, we’re diving into the Sentinels Tab , one of the most critical components of the...
84 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne(P3- Network Discovery / Ranger): A Practical Guide/An Practical Training](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Dec 18, 20244 min read
SentinelOne(P3- Network Discovery / Ranger): A Practical Guide/An Practical Training
Welcome back to Part 3  of our exploration of SentinelOne’s powerful features! Today, let’s dive into one of the most fascinating and...
69 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne(P2- SentinelOne's Deep Visibility: Enhanced vs. Legacy): A Practical Guide/An Practical Training](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Dec 16, 20247 min read
SentinelOne(P2- SentinelOne's Deep Visibility: Enhanced vs. Legacy): A Practical Guide/An Practical Training
Welcome back to the SentinelOne journey! As promised, we’re diving deep into the Deep Visibility  feature—a powerhouse for threat hunting...
88 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne(P1- Dashboard): A Practical Guide/An Practical Training](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Dec 14, 20244 min read
SentinelOne(P1- Dashboard): A Practical Guide/An Practical Training
In this article, I’ll walk you through SentinelOne’s console, explaining how to navigate and utilize its powerful features . Think of...
165 views0 comments
![](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
![SentinelOne: Navigating a Cybersecurity Titan](https://static.wixstatic.com/media/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_732a9fbddbba4ff594aea9c4cdb2fc9f~mv2.webp)
-
Dec 12, 20244 min read
SentinelOne: Navigating a Cybersecurity Titan
Hello, friends and fellow cyber enthusiasts! Over the years, I’ve had the privilege of working with a wide range of cybersecurity tools ,...
47 views0 comments
![](https://static.wixstatic.com/media/5fb032_53f14b93f34c459e8cb9ed7594312dc8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_53f14b93f34c459e8cb9ed7594312dc8~mv2.webp)
![Advanced Tools for Adversary Emulation and Purple Teaming: Enhancing Resilience Against Cyber Threats](https://static.wixstatic.com/media/5fb032_53f14b93f34c459e8cb9ed7594312dc8~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_53f14b93f34c459e8cb9ed7594312dc8~mv2.webp)
-
Dec 11, 20243 min read
Advanced Tools for Adversary Emulation and Purple Teaming: Enhancing Resilience Against Cyber Threats
Adversary emulation is a proactive cybersecurity approach where security experts simulate the tactics, techniques, and procedures (TTPs)...
80 views0 comments
![](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
![Cyber Crime: A Focus on Financial Gain, Espionage(Turla (Uroburos/Snake)](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
-
Dec 9, 20246 min read
Cyber Crime: A Focus on Financial Gain, Espionage(Turla (Uroburos/Snake)
Espionage, the art of covert information gathering, is an ancient practice that has evolved with each generation. The core drivers of...
22 views0 comments
![](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
![Cyber Crime: A Focus on Financial Gain (BlackEnergy, NotPetya)](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
-
Dec 5, 20243 min read
Cyber Crime: A Focus on Financial Gain (BlackEnergy, NotPetya)
BlackEnergy: Lights Out in Ukraine On December 23, 2015, a sophisticated cyber attack plunged 200,000 Ukrainians into darkness, cutting...
17 views0 comments
![](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
![Cyber Crime: A Focus on Financial Gain (Stuxnet: The World’s First Digital Weapon)](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
-
Dec 2, 20245 min read
Cyber Crime: A Focus on Financial Gain (Stuxnet: The World’s First Digital Weapon)
Since the 1950s, Iran has pursued nuclear energy, initially with Western support, aiming to harness nuclear power for electricity. B ut...
31 views0 comments
![](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
![Cyber Crime: A Focus on Financial Gain (Human-Operated Ransomware, LockBit 2.0, and Crypto Mining Malware)](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
-
Nov 19, 20245 min read
Cyber Crime: A Focus on Financial Gain (Human-Operated Ransomware, LockBit 2.0, and Crypto Mining Malware)
In recent years, the landscape of cybercrime has drastically changed, evolving from random attacks to highly organized, human-operated...
26 views0 comments
![](https://static.wixstatic.com/media/5fb032_8bc1bcf37e6c4aedb9c73f69f9043367~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_8bc1bcf37e6c4aedb9c73f69f9043367~mv2.webp)
![Unified Kill Chain: An evolution of Cyber Kill chain](https://static.wixstatic.com/media/5fb032_8bc1bcf37e6c4aedb9c73f69f9043367~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_8bc1bcf37e6c4aedb9c73f69f9043367~mv2.webp)
-
Nov 18, 20243 min read
Unified Kill Chain: An evolution of Cyber Kill chain
The Unified Kill Chain (UKC) is an evolution of earlier cyber kill chain models , addressing key limitations of traditional frameworks,...
134 views0 comments
![](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
![Cyber Crime: A Focus on Financial Gain(Bangladesh Bank Heist via the SWIFT network)](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
-
Nov 16, 20246 min read
Cyber Crime: A Focus on Financial Gain(Bangladesh Bank Heist via the SWIFT network)
The 2016 Bangladesh Bank Heist  stands out as a significant digital theft where hackers exploited the SWIFT financial messaging system to...
48 views0 comments
![](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
![Cyber Crime: A Focus on Financial Gain (Zeus Trojan, Emotet Trojan, Carbanak)](https://static.wixstatic.com/media/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_d9c3ed08822944e5beebd7963588c3da~mv2.webp)
-
Nov 15, 20242 min read
Cyber Crime: A Focus on Financial Gain (Zeus Trojan, Emotet Trojan, Carbanak)
Monetary Gain as the Core Driver of Cybercrime Cyber criminals are motivated by financial profit, making their targets somewhat...
28 views0 comments
bottom of page