PinnedPublished inDataBullsNew NIST Cybersecurity Framework 2.0 – Draft Publication – What are possible changes ?As of 8 August 2023, NIST released the draft new version of their flagship framework. Since 2014 the framework has been used widely to…Aug 11, 2023A response icon1Aug 11, 2023A response icon1
PinnedPublished inInfoSec Write-upsHow to use ChatGPT for Ethical Hacking ?I would like to discover several ways to use ChatGPT for Ethical Hacking and Information Security purposes by asking for input from ChatGPTAug 13, 2023A response icon2Aug 13, 2023A response icon2
PinnedPublished inThe Gray AreaA Framework for Cyber Threat HuntingCyber threat hunting has emerged as a proactive strategy to identify and neutralize threats that evade standard defenses.Aug 22, 2023Aug 22, 2023
PinnedPublished inThe Gray AreaA Beginner’s Guide to the OSINT FrameworkToday, I’ll introduce you to a resource that has become a cornerstone in the world of open-source intelligence.Aug 10, 2023A response icon2Aug 10, 2023A response icon2
PinnedPublished inOSINT TeamPhishing Email Investigation — An AnalyA phishing email investigation refers to the process of analyzing a suspicious email to determine if it’s part of a phishing attack. This…Aug 7, 2023A response icon3Aug 7, 2023A response icon3
Introduction to European Union (EU) Artificial Intelligence(AI) LawThe European Union (EU) is pioneering the regulation of artificial intelligence (AI) through its proposed AI Act, aiming to mitigate the…Feb 9, 2024A response icon1Feb 9, 2024A response icon1
Best Free SOC Analysis ToolsA pivotal component of the defense strategy is the Security Operations Center (SOC), the nerve center responsible for detecting, analyzing…Aug 22, 2023A response icon2Aug 22, 2023A response icon2
Python in Cyber Security — Applications and ExamplesPython is one of the most popular programming languages in cybersecurity due to its simplicity, flexibility, and extensive library support…Aug 16, 2023A response icon2Aug 16, 2023A response icon2
Collection of 20 Cyber Security ArticlesCurated list of 20 Cyber Security ArticlesAug 16, 2023Aug 16, 2023
Published inInfoSec Write-upsOSINT Series Part 1 — European Cyber Security ChallengeWhile I was scavenging through the internet I came across with The European Cyber Security Challenge (ECSC) and decided to solve some of…Aug 15, 2023A response icon1Aug 15, 2023A response icon1