Articles in this series
I'm excited to share a recent project I worked on: a Linux Kernel Module (LKM) that acts as a basic packet filter firewall, specifically designed to...
Alright.... So, I just wrapped up an exciting project! While analyzing a malware sample, I noticed how it detects if it's running inside a virtual...
The Security, Functionality, & Usability Triangle! The level of security of any system can be defined by the strength of these three components: 1....
As a security professional or novice in the cybersecurity world, you need to understand what a 'threat' is all about. In the absence of this...
Social Engineering is based on manipulating the minds of humans to do whatsoever thing you want them to do. It is a technique that relies on human...