Ranswomare Analysis & Reverse Engineering | Risen Ransomware | LetsDefend Walkthrough This article provides an in-depth analysis of the Risen ransomware, a malicious software designed to encrypt user files and extort payments…
Hacking VOIP Web Applications | MagnusBilling | TryHackMe Billing Walkthrough This article explores how VOIP web applications, specifically MagnusBilling, can be exploited using simple command-line techniques. This…
Disk Forensics In Cyber Security | NTFS Forensics | TryHackMe NTFS Analysis The article is an in-depth forensics guide on how to analyze the NTFS (New Technology File System) in Windows using forensic tools. It…
TryHackMe SAL1 Certification Complete Review & Walkthrough The SAL1 is an entry-level certification introduced by TryHackMe, aimed at individuals aspiring to become Security Operations Center (SOC)…
How Hackers Use Plain Images to Deliver Malware | Xworm Analysis with Any.Run This post provides an in-depth analysis of a recent cyber attack known as the StegoCampaign, where hackers used PDF and image files to…
Splunk Certified Cybersecurity Defense Analyst Study Notes — SPLK 5001 The SPLK-5001 study guide & notes is designed to prepare individuals for the Splunk Certified Cybersecurity Defense Analyst certification…
Real Time SOC Analysis & Training | TryHackMe SOC Simulator Introduction to Phishing The post covers real-time SOC (Security Operations Center) analysis with a focus on phishing detection and response using TryHackMe’s SOC…