PinnedPublished inInfoSec Write-ups“Strengthening Your Cybersecurity Posture: Comprehensive Guide to Conducting Vulnerability…How Identifying and Addressing Weaknesses Can Protect Your Organization from Cyber ThreatsJun 5, 2024Jun 5, 2024
PinnedPublished inInfoSec Write-ups“The Evolution of Phishing Attacks: From Deceptive Emails to Sophisticated Cyber Threats”Understanding the Tactics, Impacts, and Defenses Against Modern Cyber ThreatsJun 5, 2024Jun 5, 2024
Published inInfoSec Write-upsVirus Detection through PfSense & Log forwarding to WazuhIn this blog we are doing simple viruse detection through PfSense and then sending the virus detected logs of PfSense to Wazuh Server for…Sep 16, 2024Sep 16, 2024
Published inInfoSec Write-upsPfsense Installation and Configuration GuideThe following guide is the detailed step by step installation of Pfsense.Sep 16, 2024Sep 16, 2024
Enhancing Intrusion Detection Systems using AIThe escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. Here…Jul 25, 2024Jul 25, 2024