Ahmed NosirThe Ultimate Security Team Concept: Learning from FIFAIn the world of football, success depends on how well a team is balanced and coordinated. FIFA’s Ultimate Team concept teaches us that it’s…Sep 9Sep 9
Ahmed NosirSecuring the CIA Triad: SQL Injection VulnerabilitiesThe CIA triad is a fundamental concept in information security that stands for Confidentiality, Integrity, and Availability. These three…Aug 28Aug 28
Ahmed NosirSecurity Automation Series: Part 5 — Automating IP Blocking in pfSenseWelcome back to our “Security Automation Series.” In the previous parts, we set up our testing environment, delved into Suricata basics…Jul 24Jul 24
Ahmed NosirSecurity Automation Series: Part 6 — Automating IP Blocking in pfSense Using Node-REDWelcome back to our “Security Automation Series.” In the previous parts, we set up our testing environment, explored Suricata basics…Jul 24Jul 24
Ahmed NosirSecurity Automation Series: Part 4 — Automating Suspicious IP Reporting with Suricata and AbuseIPDBWelcome back to our “Security Automation Series.” In the previous parts, we set up our testing environment and delved into the basics of…Jul 24Jul 24
Ahmed NosirSecurity Automation Series: Part 3 — Suricata 101 BasicsWelcome back to our “Security Automation Series.” In the last part, we set up a basic testing environment with pfSense and Suricata. If…Jul 3Jul 3
Ahmed NosirSecurity Automation Series: Part 2 — Preparing Your Testing EnvironmentWelcome back to our “Security Automation Series.” In the first part, I shared my personal journey of overcoming the overwhelming tasks in…Jun 30Jun 30
Ahmed NosirSecurity Automation Series: Part 1 — Power of Automation in CybersecurityAs a cybersecurity professional, I’ve experienced the pressure that comes with Security Operations. The constant influx of alerts…Jun 27Jun 27
Ahmed NosirRDP Bitmap Forensics for DFIR InvestigationsRemote Desktop Protocol (RDP) is a widely used protocol that allows users to remotely connect to and control other computers. As convenient…Jun 7Jun 7
Ahmed NosirLatest Cybersecurity Attacks on 4G and 5G NetworksWith the evolution of mobile networks from 4G to 5G, the potential for innovative applications and faster connectivity has skyrocketed…Jun 1Jun 1