Cyber Threat Intelligence (CTI)
This is the process of gathering, analysing, and utilizing information about potential or current threats to an organization’s digital assets focusing on understanding the threat landscape identifying threat actors, and anticipating...
PE Headers and Sections Explained
The Portable Executable (PE) format is a file format for executables, object code, DLLS, and others used in Windows operating systems. The structure of a PE file includes several headers, each...
Reverse Engineer – Assembly Basics
Assembly is a low-level programming language that provides a way to write instructions that the CPU can execute directly, it’s closely related to machine code but uses human-readable mnemonics.
Registers
These are small...
Black Holing Made Simple
This is a network security measure used to handle unwanted or potential harmful traffic. If the traffic is unwanted or harmful, all the data sent to a particular IP address or...
System Failure Behaviours Explained
The terms “fail open”, “fail close”, "Fail Safe", "Failover" describe how systems behave when they encounter a failure or unexpected event. These concepts are crucial to maintain either availability or ensure...
Different Types of Firewalls Explained (WAF, HBF, NBF, NGFW)
Web Application Firewall (WAF)
It’s a Firewall that operates at the Application Layer (Layer 7 OSI) that’s designed to monitor, filter and block HTTP/HTTPS traffic to and from a Web Application.
This type...
Access Controls
Access controls are mechanisms that manage how resources are accessed and by whom. Here are some common types of access controls:
Role-Based Access Control (RBAC)
Permissions are assigned to specific roles rather than...
Regex (Regular Expressions)
Regex (short for Regular Expressions) is a powerful tool used for searching, matching, and manipulating text based on specific patterns. Understanding and mastering this tool involves learning its syntax, operators, and...
Detection Engineering and Its Types
This aspect of cybersecurity focuses on developing methods and strategies to detect malicious activities within an organization’s network and systems. It involves creating, deploying, and maintaining detection mechanisms such as alerts,...
Simple Concepts of Reverse Engineering
Reverse engineering in cybersecurity involves analysing software, systems, or hardware to understand their design, functionality and behaviour. The goal is often to uncover vulnerabilities, analyse malware, or understand proprietary systems for...