Skip to main content

Cybersecurity

loading · loading ·

2025

On-Path Attacks with Ettercap
·2135 words·11 mins· loading · loading
Cybersecurity Network Security Penetration Testing Cybersecurity MITM Attack Ettercap Network Security ARP Spoofing Penetration Testing
A hands-on guide to performing On-Path Attacks using Ettercap, covering ARP spoofing, traffic interception, and security implications.
My Cybersecurity Journey: A New Beginning
·441 words·3 mins· loading · loading
Cybersecurity Ethical Hacking SIEM Threat Intelligence Cybersecurity Ethical Hacking Threat Intelligence SOC Red Teaming Blue Teaming Digital Forensics
Insights, tutorials, and hands-on experiences in cybersecurity.
Threat Hunting with OSINT and Splunk: A Hands-on Guide
·1399 words·7 mins· loading · loading
Cybersecurity Threat Hunting OSINT OSINT Splunk Threat Hunting Cybersecurity SIEM Kali Linux
Learn how to use OSINT tools like Shodan and analyze security logs in Splunk to detect and mitigate cyber threats.
A Practical Guide to Zero Trust Security: Implementing Network Segmentation with pfSense, MFA with Authy, and Continuous Monitoring Using Splunk
·2063 words·10 mins· loading · loading
Cybersecurity Network Security Zero Trust PfSense MFA Authy Splunk Cybersecurity Network Security
Learn how to implement a basic Zero Trust Architecture using pfSense for network segmentation, Authy for MFA, and Splunk for continuous monitoring.
Exploring Vulnerabilities: A Hands-On Assessment with OpenVAS(GVM)
·408 words·2 mins· loading · loading
Case Study Security Vulnerability Management Network Security Penetration Testing Cybersecurity Vulnerability Assessment OpenVAS Kali Linux Network Security Penetration Testing Threat Intelligence
# Exploring Vulnerabilities: A Hands-On Assessment with OpenVAS(GVM) # Introduction

2024

Assessing the Risk Profile of CyberTech Solutions and Implementing a Security Policy
·1329 words·7 mins· loading · loading
Cybersecurity Risk Management Information Security IT Governance Cybersecurity Risk Assessment Security Policy Network Security Password Policy Incident Response Data Protection Employee Training
An in-depth assessment of CyberTech Solutions’ security risks and the development of a security policy to mitigate vulnerabilities, covering password policies, patch management, network security, data backup, and employee training.
Wireshark Traffic Analysis
·3267 words·16 mins· loading · loading
Cybersecurity Network Forensics Penetration Testing Incident Response Wireshark Traffic Analysis Cybersecurity Packet Analysis Network Security Forensics Intrusion Detection Threat Hunting
A deep dive into analyzing network traffic using Wireshark for security monitoring, forensics, and threat detection.
Secure Your Kali Linux with UFW: Uncomplicated Firewall Setup
·1473 words·7 mins· loading · loading
Cybersecurity Linux Security System Hardening Network Defense Kali Linux Firewall UFW Linux Security Network Security Cybersecurity System Hardening Penetration Testing
A step-by-step guide to configuring UFW (Uncomplicated Firewall) on Kali Linux to enhance security and protect against unauthorized access.
Vulnerability Scan Report for DATASAFE SOLUTION
·577 words·3 mins· loading · loading
Security Reports Vulnerability Scan Cybersecurity Network Security Nmap
Comprehensive vulnerability scan report for DATASAFE SOLUTION, detailing security risks and recommendations.