top of page

Please access this website using a laptop / desktop or tablet for the best experience


Lateral Movement Analysis: Using Chainsaw, Hayabusa, and LogParser for Cybersecurity Investigations
A few days ago, I received a request through my website from someone working on an incident response case. He mentioned a situation...
-
Jan 6, 20259 min read


SentinelOne(P9- Settings): A Practical Guide/An Practical Training
The Settings section in the SentinelOne Console is your central hub for configuration and management. Here's a detailed breakdown of its...
-
Jan 3, 20252 min read


SentinelOne (P8- SentinelOne Automation) :Guide / Training to Forensic Collection, KAPE Integration, Running Script and Incident Response
SentinelOne’s DFIR capabilities are a standout feature, making it a must-have tool for forensic analysts. Let me walk you through how...
-
Jan 1, 20258 min read


Welcoming the New Year: A Time for New Beginnings and Endless Possibilities
As we close the chapter on another year, it’s time to look ahead with excitement, hope, and optimism. The New Year is not just a date on...
-
Jan 1, 20252 min read


SentinelOne(P7- Activity/Reports): A Practical Guide/An Practical Training
Let’s dive into two key sections of SentinelOne’s console: the Activity Tab and the Reports Tab . Activity Tab: The Console’s Audit Log...
-
Dec 30, 20242 min read


SentinelOne(P6- ISPM/Application Management): A Practical Guide/An Practical Training
Before diving into the new chapter on Applications , I want to highlight Identity . While these features are undoubtedly promising, I...
-
Dec 27, 20243 min read


SentinelOne(P5- Incidents): A Practical Guide/An Practical Training
When it comes to cybersecurity, Incidents in SentinelOne is where most of the action happens. This is the go-to place for SOC analysts...
-
Dec 23, 20246 min read


SentinelOne(P4- Sentinels): A Practical Guide/An Practical Training
Welcome back to the SentinelOne journey! Today, we’re diving into the Sentinels Tab , one of the most critical components of the...
-
Dec 20, 202412 min read


SentinelOne(P3- Network Discovery / Ranger): A Practical Guide/An Practical Training
Welcome back to Part 3 of our exploration of SentinelOne’s powerful features! Today, let’s dive into one of the most fascinating and...
-
Dec 18, 20244 min read


SentinelOne(P2- SentinelOne's Deep Visibility: Enhanced vs. Legacy): A Practical Guide/An Practical Training
Welcome back to the SentinelOne journey! As promised, we’re diving deep into the Deep Visibility feature—a powerhouse for threat hunting...
-
Dec 16, 20247 min read


SentinelOne(P1- Dashboard): A Practical Guide/An Practical Training
In this article, I’ll walk you through SentinelOne’s console, explaining how to navigate and utilize its powerful features . Think of...
-
Dec 14, 20244 min read


SentinelOne: Navigating a Cybersecurity Titan
Hello, friends and fellow cyber enthusiasts! Over the years, I’ve had the privilege of working with a wide range of cybersecurity tools ,...
-
Dec 12, 20244 min read


Advanced Tools for Adversary Emulation and Purple Teaming: Enhancing Resilience Against Cyber Threats
Adversary emulation is a proactive cybersecurity approach where security experts simulate the tactics, techniques, and procedures (TTPs)...
-
Dec 11, 20243 min read


Cyber Crime: A Focus on Financial Gain, Espionage(Turla (Uroburos/Snake)
Espionage, the art of covert information gathering, is an ancient practice that has evolved with each generation. The core drivers of...
-
Dec 9, 20246 min read


Cyber Crime: A Focus on Financial Gain (BlackEnergy, NotPetya)
BlackEnergy: Lights Out in Ukraine On December 23, 2015, a sophisticated cyber attack plunged 200,000 Ukrainians into darkness, cutting...
-
Dec 5, 20243 min read


Cyber Crime: A Focus on Financial Gain (Stuxnet: The World’s First Digital Weapon)
Since the 1950s, Iran has pursued nuclear energy, initially with Western support, aiming to harness nuclear power for electricity. B ut...
-
Dec 2, 20245 min read


Cyber Crime: A Focus on Financial Gain (Human-Operated Ransomware, LockBit 2.0, and Crypto Mining Malware)
In recent years, the landscape of cybercrime has drastically changed, evolving from random attacks to highly organized, human-operated...
-
Nov 19, 20245 min read


Unified Kill Chain: An evolution of Cyber Kill chain
The Unified Kill Chain (UKC) is an evolution of earlier cyber kill chain models , addressing key limitations of traditional frameworks,...
-
Nov 18, 20243 min read


Cyber Crime: A Focus on Financial Gain(Bangladesh Bank Heist via the SWIFT network)
The 2016 Bangladesh Bank Heist stands out as a significant digital theft where hackers exploited the SWIFT financial messaging system to...
-
Nov 16, 20246 min read


Cyber Crime: A Focus on Financial Gain (Zeus Trojan, Emotet Trojan, Carbanak)
Monetary Gain as the Core Driver of Cybercrime Cyber criminals are motivated by financial profit, making their targets somewhat...
-
Nov 15, 20242 min read
bottom of page