Alireza GhahroodTop 10 LoL Binaries and Techniques Used by Cyber Threat ActorsLiving off the Land Binaries (LoLBins) are legitimate Windows system files, tools, and executables that can be used by attackers to perform…Mar 23, 2023Mar 23, 2023
Alireza GhahroodLet’s go to the technical solution of testing the maturity level of the effectiveness of security…Top Threats in your Organisation:Nov 7, 20221Nov 7, 20221
Alireza GhahroodThese resources are to help you if you’re interested in learning more about Cyber Threat…40+ Threat Intelligence Courses:Nov 4, 2022Nov 4, 2022
Alireza GhahroodCyberSecurity Free Certificates 2022The demand for cybersecurityNov 4, 2022Nov 4, 2022
Alireza GhahroodCYBER WARFARE AND TERRORISMSuggested: Dorothy Denning Paper ISIS and Cyber CaliphateNov 2, 2022Nov 2, 2022
Alireza GhahroodStrategies for endpoint security and resilience against ransomware attacksCyber security trends for 2022 & beyond:Oct 30, 2022Oct 30, 2022
Alireza GhahroodSample Assessment 4 MS Cyber SecurityWhy is prevention alone NOT enough to deal with attackers?Oct 29, 2022Oct 29, 2022
Alireza Ghahrood5 Things Every FirstYear Auditor Should KnowIf you plan to have a successful career in audit, there are some things you need to know when starting out that will set you apart and set…Oct 29, 2022Oct 29, 2022