Ahmed NosirSecurity Automation Series: Part 3 — Suricata 101 BasicsWelcome back to our “Security Automation Series.” In the last part, we set up a basic testing environment with pfSense and Suricata. If…Jul 3Jul 3
Ahmed NosirSecurity Automation Series: Part 2 — Preparing Your Testing EnvironmentWelcome back to our “Security Automation Series.” In the first part, I shared my personal journey of overcoming the overwhelming tasks in…Jun 30Jun 30
Ahmed NosirSecurity Automation Series: Part 1 — Power of Automation in CybersecurityAs a cybersecurity professional, I’ve experienced the pressure that comes with Security Operations. The constant influx of alerts…Jun 27Jun 27
Ahmed NosirRDP Bitmap Forensics for DFIR InvestigationsRemote Desktop Protocol (RDP) is a widely used protocol that allows users to remotely connect to and control other computers. As convenient…Jun 7Jun 7
Ahmed NosirLatest Cybersecurity Attacks on 4G and 5G NetworksWith the evolution of mobile networks from 4G to 5G, the potential for innovative applications and faster connectivity has skyrocketed…Jun 1Jun 1
Ahmed NosirUnderstanding the Difference Between Cyber Kill Chain and MITRE ATT&CKEvery day, thousands of people experience cybersecurity issues. These risks are increasing steadily, and ignoring them can lead to costly…Jun 1Jun 1
Ahmed NosirProgramming vs Scripting for NewbiesWelcome to the world of coding! Whether you’re just starting your tech journey or looking to deepen your understanding of computer…Apr 18Apr 18
Ahmed NosirCrafting an Effective Incident Report: A Guide for SOC AnalystsIncident reporting is a critical component in the lifecycle of incident management within a Security Operations Center (SOC). An effective…Feb 4Feb 4
Ahmed NosirAutoRun Malware Services Understanding Detection And MitigationAuto-Run Malware Services: Understanding, Detection, and MitigationFeb 1Feb 1