PinnedPublished inTowards DevMastering RBAC: How to Secure Your GKE Clusters with Google GroupsUnmasking Role-Based Access Control in KubernetesJan 29Jan 29
Securing Success: Our Journey of achieving a Cyber Essentials Plus CertificationAchieving Cyber Essentials Basic and Plus Certifications.Dec 30, 2023Dec 30, 2023
NahamCon CTF 2023 — IR (Challenge Group) WriteupHey Folks, I participated in NahamCon CTF 2023. This post covers the writeup for challenge group IR by @awesome10billion#1164 (CTFd).Jun 19, 2023Jun 19, 2023
NahamCon CTF 2023 — Fetch WriteupHey Folks, I participated in NahamCon CTF 2023, my main focus was on solving Forensics Category Challenges. This post covers the writeup…Jun 19, 2023Jun 19, 2023
From Evidence to Answers: Navigating Forensic CTF Challenges with Skill — Part IIWelcome to the Part II of From Evidence to Answers: Navigating Forensic CTF Challenges with Skill.Jun 2, 2023Jun 2, 2023
From Evidence to Answers: Navigating Forensic CTF Challenges with Skill — Part ILet’s have a blast of some forensics challenges.May 22, 2023May 22, 2023
Published inTowards DevAutomating SOC Workflow with Python & VirusTotalAs a SOC Analyst, I spend most of my day investigating potential security threats and analyzing data from various sources. But little did…Apr 13, 20232Apr 13, 20232