top of page

Please access this website using a laptop / desktop or tablet for the best experience


Part 1 : Security in DevSecOps
Hey everyone 👋 So here’s the deal: I’m not a DevOps engineer. I come from the Incident response/Forensic side. But in my current...
-
Sep 29, 20253 min read


Analyzing System Security with Attack Surface Analyzer (ASA)
When installing or running new software, your operating system’s security configuration can change behind the scenes — new services,...
-
Sep 22, 20252 min read


Memory Forensics: A Step-by-Step Methodology
When you’re in the middle of an incident response, memory analysis is one of the most powerful ways to uncover what really happened on a...
-
Sep 16, 20252 min read


Ransomware, Malware, and Intrusions: A Step-by-Step Analysis Methodology
When I look back at all the articles, guides, and tool walkthroughs I’ve written, one question keeps coming up: “Where do we actually...
-
Sep 15, 20253 min read


Divide and rule in Incident Response
You know that old principle we all learned in programming — divide and rule ? Break the big problem into smaller pieces, solve those, and...
-
Sep 12, 20253 min read


Beyond Tools: The Human Side of Incident Response
When people hear incident response , they often picture someone hammering away at a terminal, pulling artifacts, and cracking malware....
-
Sep 10, 20253 min read


The Sneakiest Phishing Trick I’ve Seen Lately — And Why Your Email Security Won’t Save You
Before I start!!!! 💡 Credit where it’s due: This insight comes straight from J , one of the sharpest call investigators and my dearest...
-
Sep 9, 20253 min read


The Core Principles of Successful Incident Response
When people think of Incident Response (IR), they usually imagine technical skills—reverse engineering malware, parsing logs, or hunting...
-
Sep 8, 20253 min read


From Rejection to Relocation: Breaking Myths About Getting a Job Abroad
I never thought I’d write this article. This isn’t a motivational speech or a “5 steps to success” kind of blog. This is my story —...
-
Sep 7, 20253 min read


🔐 DoH, DoT, and Punycode: What Every Forensicator Needs to Know About Modern DNS Evasion Tactics
DNS is often referred to as the phonebook of the internet — and traditionally, it’s been fairly easy to read. But as privacy and...
-
Aug 22, 20253 min read


🧬 DGA: The Algorithmic Backbone of Modern Malware C2 Infrastructure
In the ever-evolving cat-and-mouse game of cyber defense and offense, one technique has proven especially resilient: Domain Generation...
-
Aug 21, 20253 min read


🌀 Fast-Flux DNS: How Malware Uses DNS to Stay Invisible
Cybercriminals are always evolving, and so are their tactics. One particularly sneaky method that’s been gaining ground over the years is...
-
Aug 20, 20253 min read


DNS in Forensics: The Hidden Goldmine for Threat Hunting
When we think about forensic investigations and threat hunting, DNS isn’t usually the first thing that pops into our minds. But if you...
-
Aug 19, 20253 min read


The Final Piece: Hunting, Searching, and Analyzing Like a Pro in Sublime EDR for Email
Alright folks, I’ve saved the best for last . If you’ve ever worked with a traditional EDR (Endpoint Detection & Response) tool, you know...
-
Aug 16, 20253 min read


Meet ASA: Your New AI-Powered Security Teammate from Sublime Security
Let’s be real— dealing with hundreds (sometimes thousands) of user-reported phishing emails every day can be a nightmare for security...
-
Aug 15, 20255 min read


Beyond Detection: Hidden Power Features of Sublime Security
While Detection Rules and Automations are at the heart of Sublime Security's threat detection and response, the platform is packed with...
-
Aug 14, 20252 min read


Automations in Sublime Security: A Smarter Way to Respond to Email Threats
In our previous articles , we talked about how Sublime Security’s Detection Rules can be configured to automatically perform actions...
-
Aug 13, 20252 min read


Let’s Talk About Detection Rules in Sublime Security (EDR for Email!)
Okay, so in this tab, we’re going to explore one of my favorite features of Sublime Security — Detection Rules , also known as your email...
-
Aug 12, 20256 min read


Understanding the “Remediate Threats” Tab in Sublime Security
The Remediate Threats section in Sublime Security is a powerful place to review and take action on suspicious or malicious emails. It's...
-
Aug 11, 20254 min read


Sublime Security – Dashboard Walkthrough (Overview + User Reports)
Alright folks — let’s dive in! Now that I’ve hyped up Sublime Security in the last post (with good reason 😎), it’s time to show you how...
-
Aug 8, 20253 min read
bottom of page