Fortifying Synergy: Securing the Integration of Blockchain and AIIntroductionMay 29, 2023May 29, 2023
Sunburst — A Solar winds supply chain attackA SolarWinds Supply Chain Attack: Unveiling the Technicalities of a Devastating BreachMay 14, 2023May 14, 2023
Interview with Veteran Hacker/Bug Bounty Hunter — Meet Jasmin LandryThe word hacker has been associated with negativity and anyone with a hoodie and a laptop is seen as a criminal. though there have been…Jun 22, 2022Jun 22, 2022
Interview with a FANG Security Engineer — Meet Gynvael ColdwindToday I start a series, where i interview leading Cyber Security Professionals in the industry. Cyber Security in recent years has become…Mar 24, 2022Mar 24, 2022
Blockchain SecurityIf you ever wanted to understand Blockchain security, here is a breakdown of everything blockchain, the types of Blockchain Public vs…Mar 11, 2022Mar 11, 2022
Red Teaming — Think like your enemyFrom my adventures as a security researcher, i have come across the term Red Team. Lately, I have been looking into going into red teaming…Mar 13, 2021Mar 13, 2021
Newbie Security Researcher toolsIt has been three months; I have used a lot of tools and I think I am settling for a set of tools as my goto hunting tools. One thing that…Oct 26, 20201Oct 26, 20201
Newbie bug bounty hunter recon methodologyRecon short for reconnaissance is defined as the exploration of an area to gain information on a target. When it comes to Bug bounty recon…Oct 20, 2020Oct 20, 2020
Three Months as a Bug Bounty hunter/HackerJuly 2020 at the height of the global pandemic, I took an interest in Bug bounty. I have been into information technology for over 10…Oct 10, 2020Oct 10, 2020