top of page

Please access this website using a laptop / desktop or tablet for the best experience


Sublime Just Got Even Smarter: Automatic Calendar Event Deletion Is Here
If you’ve been following me for a while, you already know how much I love Sublime . It’s one of those tools that just keeps getting better — feature after feature, update after update — all with one goal: making email security effortless . And today, they’ve released something that’s honestly a game changer . The Hidden Threat: Malicious Calendar Invites We’ve all seen those sketchy calendar invites — you know, the ones that magically appear on your calendar even though you
-
13 minutes ago3 min read


Tracking Lateral Movement: PowerShell Remoting, WMIC, Explicit Credentials, NTLM Relay Attacks, Credential Theft and Reuse (Event IDs)
Welcome back, folks! If you’ve been following this series, I’ve already covered how attackers move laterally using things like named pipes, scheduled tasks, services, and registry modifications and more .Now it’s time to unpack some classic but still dangerous remote execution tricks — and how to actually hunt them down using Windows logs. ------------------------------------------------------------------------------------------------------------- PowerShell Remoting & WMIC
-
2 days ago7 min read


Tracking Lateral Movement — Named Pipes, Scheduler, Services, Registry, and DCOM (Event IDs)
Hey — today we’re unpacking lateral movement. Think of it like this : an attacker already got a foothold in your network and now wants to move sideways to more valuable systems. In this article I’ll try tp show you the common ways they do that, what Windows logs to watch for, and practical detective steps you can take right now. ------------------------------------------------------------------------------------------------------------- Why this matters Once an attacker can
-
4 days ago10 min read


PowerShell Logging: Making the Invisible Visible
If you’ve worked in cybersecurity for a while, you know one truth: PowerShell is both a friend and a foe . Administrators love it because it makes automation simple. Attackers love it because it makes exploitation simple. From credential theft to data exfiltration, lateral movement, and even memory-only malware — PowerShell can do it all. So, the real question is not whether PowerShell is being used, but how and by whom . That’s where PowerShell logging comes into play — y
-
Oct 246 min read


Event Log Clearing and Malware Execution: Evidence from Windows Logs
If you’ve worked in cybersecurity or digital forensics for even a short while, you’ve probably realized that Windows event logs are like the system’s memory — they remember almost everything that happens. From user logins and process creations to application crashes and errors, these logs quietly record the life story of a system. But what happens when someone — say, an attacker — tries to erase those memories ? Or when malware crashes in the middle of doing something shady
-
Oct 227 min read


Understanding Where Windows Authentication Logs Actually Live — From AD to Entra ID
Okay, let’s get one thing straight — Windows logging is not centralized by default. Each system—your laptop, your DC, your file server—logs its own stuff. That means if you’re doing forensics or threat hunting, you’ve got to know exactly which system has what evidence . If you pull the wrong logs, you might completely miss the attacker’s authentication trail. ------------------------------------------------------------------------------------------------------------- 1. Clien
-
Oct 204 min read


Tracking Kerberos & NTLM Authentication Failures and Investigation
When investigating intrusion attempts or suspicious login activity in Windows environments, one of the most overlooked sources of truth lies in the authentication failure logs — specifically, Kerberos Event ID 4771 and NTLM Event ID 4776 . These tiny events, often lost in the noise of massive log volumes, can tell a deep story: Was someone trying to guess passwords? Was an attacker using a stolen hash? Or was it just a misconfigured system clock? Kerberos Pre-Authentication
-
Oct 187 min read


Log Analysis – It’s Not About Knowing, It’s About Correlating
I know, I know — Log Analysis doesn’t sound like the most exciting topic these days . Everyone in cybersecurity has gone through it at some point, and if you’ve sat in an interview, you’ve probably been asked about it too. There are already tons of articles and videos on this topic out there. But here’s the thing — log analysis isn’t about knowing event IDs by heart . It’s about correlating different events together to tell a story . That’s the part most people miss. And tha
-
Oct 1610 min read


Part 7 : Secrets Management — The Right Way to Keep Your Secrets Safe
Hey everyone Let’s talk about one of the most underrated but dangerous parts of automation and DevOps: secrets management . You might not realize it, but every single system you build — whether it’s an app, CI/CD pipeline, or cloud deployment — has secrets . These are things like API tokens, SSH keys, database passwords, and service credentials that your automation tools, containers, and scripts need to function. -------------------------------------------------------------
-
Oct 154 min read


Managing Vulnerable Dependencies — The Hidden Risk in Open-Source Code
When we talk about secure coding , we usually think about the code we write — avoiding insecure functions, preventing injections, or...
-
Oct 133 min read


Understanding Semgrep — A Powerful Open-Source SAST Tool for Developers and Security Teams
If you’ve ever worked on secure coding or DevSecOps pipelines, you’ve probably come across the term SAST — Static Application Security...
-
Oct 93 min read


Part 6 : Static Analysis for Configuration and Application Code: Tools and Best Practices
Configuration code and application code both need to be treated with the same rigor as any other software. Bugs in configuration can be...
-
Oct 82 min read


Part 5 : Security in the Commit Phase: Making CI/CD Smarter, Not Slower
When a developer pushes code, it kicks off the Commit phase of the DevOps pipeline. This is where the magic of automation happens:...
-
Oct 63 min read


Part 4: Detecting High-Risk Code Changes with Code Owners & Pull Request Security
Every codebase has certain files that you just don’t want anyone to casually edit. Think about: Authentication and login logic Password...
-
Oct 33 min read


Part 3 : Version Control Security: Branch Protections
Branches in Git are like “lanes” of code. Some lanes are safe for experiments (feature branches), but others are critical highways (main,...
-
Oct 23 min read


Part 2 : Git Commit Hooks, Pre-Commit Checks & Branch Protections (Security in Action)
When we talk about security in DevSecOps, a lot of risks start right in the repo before code ever hits CI/CD pipelines. This is where...
-
Sep 303 min read


Part 1 : Security in DevSecOps
Hey everyone 👋 So here’s the deal: I’m not a DevOps engineer. I come from the Incident response/Forensic side. But in my current...
-
Sep 293 min read


Analyzing System Security with Attack Surface Analyzer (ASA)
When installing or running new software, your operating system’s security configuration can change behind the scenes — new services,...
-
Sep 222 min read


Memory Forensics: A Step-by-Step Methodology
When you’re in the middle of an incident response, memory analysis is one of the most powerful ways to uncover what really happened on a...
-
Sep 162 min read


Ransomware, Malware, and Intrusions: A Step-by-Step Analysis Methodology
When I look back at all the articles, guides, and tool walkthroughs I’ve written, one question keeps coming up: “Where do we actually...
-
Sep 153 min read
bottom of page