top of page

Cybersecurity
Cybersecurity provides information regarding Cybersecurity. Topics regarding compliance, offensive security, and defensive security are researched. This is not expert advice and therefore take it as it is. I hope the information I provide will be able to help you the reader on your journey.

Nessus Essentials - Installation Made Simple: Scan Your Network Like a Pro for Beginners
In this blog post, I’ll explore the world of vulnerability scanning using Nessus Essentials.

PenTesting - Basic Active Reconnaissance Cheat Sheet
Pentesting is a critical practice in cybersecurity involving simulated cyberattacks to uncover vulnerabilities in an organization IT space.


CrowdStrike Falcon: The Ultimate Guide to Deployment, Configuration, and Administration
<Introduction> CrowdStrike Falcon has long been recognized as a cutting-edge endpoint security solution, renowned for its AI-driven...

Exploring the Power of Feroxbuster: A Versatile Web Fuzzer
The toolkit of penetration testers and security enthusiasts is Feroxbuster. Developed by Ben “epi” Risher.

Understanding the Phases of Penetration Testing
Introduction With cyber threats constantly morphing in today's digital landscape, organizations must prioritize the security of their...


Crowdstrike: A Faulty Update with Global Reach
On July 19, 2024, a major incident occurred involving CrowdStrike's Falcon sensor software, leading to a widespread Windows outage.

Building Trust in the Age of AI: A Brief Look at AI Security
Technology is advancing faster than ever, and the rapid integration of Artificial Intelligence (AI) is reshaping our world.


API Security: Building a Foundation of Knowledge
Introduction Web application API security testing refers to the process of evaluating and assessing the security of the Application...

Web Application Security Testing (WAST): A Brief Introduction
This blog post discusses Web Application Security Testing (WAST) and how it's used to identify and mitigate vulnerabilities in webapps.


Insight into the Vulnerability Management Lifecycle
Introduction As a professional in the Cybersecurity field, I have extensive experience dealing with the vulnerability management...

Fortifying Our Defenses: Revealing the Blueprint to A Vulnerability Management Program!
Introduction In this post, I will provide a comprehensive overview of vulnerability management programs, their purpose, and the critical...

Nmap: Scan All the Things (Part Five: Secret Weapon Called NSE and Evading Detection!)
Introduction In my post on my Nmap series "Nmap: Scan All the Things" epsisode 5, I am going to be reviewing Nmap Scripting Engine (NSE)...

Nmap: Scan All the Things (Part Four: Detection, Finding All the Things!)
Introduction In my final post on my Nmap series "Nmap: Scan All the Things", I am going end the series by covering Nmap detection methods...

Nmap: Scan All the Things (Part Three: It's All about the Ports)
In part three of the Nmap: Scan all the things post, I am going to go over Nmap and its potential uses. I will cover try to provide an...


Nmap Scan All the Things (Part Two: Unmasking the Hidden: Host Discovery)
In part two of the "Nmap: Scan All the Things" Nmap series, I will try to provide a comprehensive overview of Nmap and its capabilities....

Nmap: Scan All the Things (Part One: The App, The Myth, The Legend)
Introduction This blog post is part one of five in my Nmap Scan All the Things series. I will try to extensively cover nmap and the...
bottom of page