The world we live in is closely linked to the internet. We use it to connect with loved ones through messaging, social media, video calls, and gaming. It also helps us manage important parts of our lives like finances, health, and education. You could say we have two lives: our real life and our digital... Continue Reading →
Encrypt Files Easily with OpenSSL
OpenSSL If you are like me, you probably wondered at some point, how can you encrypt your computer files. Today I will show you exactly how to encrypt files using "openssl". OpenSSL is an open-source software library that provides encryption, decryption, and cryptographic functions. It offers a wide range of cryptographic algorithms and is widely... Continue Reading →
Mastering Terminal Commands for Beginners
Whether you are in the beginning stages of your pentesting journey, a SOC analyst, incident responder, or threat analyst, at some point in your career, you will have to use your computer's terminal. The Terminal is an interface that allows an user to interact with the computer via the command line (CLI). As the name... Continue Reading →
Leveraging Threat Intelligence for Cybersecurity Career Boost
When I transitioned to a new career over a year ago, one of the many aspects I had to master, which considerably boosted my cybersecurity career, was how to conduct Threat Intelligence (TI). Threat intelligence involves the collection, processing, and analysis of data to gain a comprehensive understanding of a threat actor's attack patterns, most... Continue Reading →

