Pyramid of Pain
The Pyramid of Pain is a concept in cybersecurity that helps to visualize and understand the impact of various indicators of compromise (IOCs) on...
Reverse Engineer Assembly: Flags and Memory Addressing
Flags are special indicators used by the processor to signal the outcome of operations, these are stored in a special register called the flags...
Detection Engineering and Its Types
This aspect of cybersecurity focuses on developing methods and strategies to detect malicious activities within an organization’s network and systems. It involves creating, deploying,...
DNS Sinking Explained
DNS Sinking (DNS Sinkholing) is a crucial cybersecurity technique used to redirect malicious or unwanted traffic to a controlled IP address, effectively neutralizing threats...
Different Types of Firewalls Explained (WAF, HBF, NBF, NGFW)
Web Application Firewall (WAF)
It’s a Firewall that operates at the Application Layer (Layer 7 OSI) that’s designed to monitor, filter and block HTTP/HTTPS traffic...
Kernel Explanation
The kernel is a fundamental part of any Operating System, acting as the bridge between software and hardware. It’s responsible for managing the system’s...
System Failure Behaviours Explained
The terms “fail open”, “fail close”, "Fail Safe", "Failover" describe how systems behave when they encounter a failure or unexpected event. These concepts are...
Risk, Vulnerability and Threats
In cybersecurity, understanding the differences between risk, vulnerability, and threats is crucial for effective risk management and mitigation.
Risk
This is the potential loss, damage or...
Access Controls
Access controls are mechanisms that manage how resources are accessed and by whom. Here are some common types of access controls:
Role-Based Access Control (RBAC)
Permissions...
Disk Redundancy RAID
Disk redundancy through RAID (Redundant Array of Independent Disks) is a method used to protect data and improve performance by combining multiple hard drives...






























