Category: cybersecurity

  • PCAP files

    PCAP files

    Packet Capture or PCAP files are files that contain a snapshot of network packet data. PCAPs are useful for network engineers and security analysts to see what is happening on the network, helping troubleshoot network issues by looking at TCP handshakes for example, and to defend against security threats by…

  • OT, ICT and SCADA

    OT, ICT and SCADA

    when we hear about financial institutions or large corporations being hacked, our first reaction may be, oh boo hoo, a company with loads of money got hacked and lost some IP or perhaps had to pay some ransom….what about when it affects utilities? ie. your heat, gas, power, hospitals, waste…

  • Adversarial ML – NIST document update

    Adversarial ML – NIST document update

    NIST have been publishing documents on Adversarial Machine Learning (AML) concepts and terminology, and while many have been obsoleted, the latest one is NIST AI 100-2 E2023 and can be found here: https://csrc.nist.gov/pubs/ai/100/2/e2023/final Its only about 100 pages (20 or so are reference pages) so an easy read and its…

  • PCI DSS & GDPR

    PCI DSS & GDPR

    PCI DSS – as many businesses utilize online payments, I wanted to take a look at the details of PCI DSS and understand it a little more – I thought it would be a fairly dry topic, but the online course I did was actually quite enjoyable and I am…

  • Mother of all Breaches

    Mother of all Breaches

    a data breach of over 26 billion records dubbed MOAB, or the “Mother of all breaches” has been discovered and currently making headlines. https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/ cybernews has put out a data checker to see if your data has been leaked but I’m sure SOC analysts around the world are bracing themselves…

  • Windows Process Tree

    Windows Process Tree

    as I start getting into my labs, its pretty clear that a good understanding of the normal processes in a Windows environment is needed if you are going to know if a Windows endpoint is compromised (eg. malware executed)-although I am familiar with using ps command in linux, I am…

  • HTB

    HTB

    after doing some foundational study on Coursera and other platforms, its now time to jump into some hands-on labs. I am starting with a well known “Home labs as a Service” provider, HackTheBox for now and have selected the SOC analyst learning path. My reasoning for this is that I’m…

  • AI and LLM – part 2

    AI and LLM – part 2

    after my last post, it seems the algorithms did their thing and I was suggested a webinar by SentinelOne on the Impacts of AI in Security and I attended this live even though it was 3am my time as it was something I really didn’t want to miss out on…

  • What’s a CVE anyway?

    What’s a CVE anyway?

    reading about the recent vulnerabilities announced by Atlassian in articles such as this one, https://www.helpnetsecurity.com/2024/01/16/cve-2023-22527/ prompted me to look into what makes it become a CVE and what is the process involved, as there were assumptions I had made about legal disclosure and I was mistaken. Any security vulnerabilities that…

  • Pentest GPT

    Pentest GPT

    I have been using ChatGPT quite a lot these days to help with my coding studies, and there is a whole area of AI devoted to prompts so its not surprising that we are seeing Chat GPT used for automating pentesting tasks. According this article the tool was able to…

  • AI and LLM cyber attacks

    AI and LLM cyber attacks

    we are starting to see a lot more articles in the cybersecurity space around the use of AI in cyber attacks. Cyber criminals like any criminal are opportunistic and will use whatever vulnerability is easy to exploit, or whatever tool that is at their disposal. This is an interesting article…

  • CISSP exam

    CISSP exam

    so I have spent the last few months preparing for my CISSP exam and as I do some final revision and schedule my exam, here are a list of the resources I used and the cost involved – with the weak yen this is quite the investment… Pete Zergers’ exam…

  • Second Brain

    Second Brain

    I had heard the concept of a “second brain” a while back and finally sat down to do some proper reading on the subject.I soon realized this would be a great way to structure my learning. I had a collection of saved URLs and text notes I wrote on my…

  • Kali linux

    Kali linux

    for pentesting and other tasks, Kali (built on debian) is the most useful piece of kit for pentesters and ethical hackers with over 600 inbuilt tools, and although I wont be jumping into using the tools just yet, I thought I had better know how to spin up a VM…