Understanding the MITRE ATT&CK Framework
Understanding the MITRE ATT&CK Framework The MITRE ATT&CK framework is a publicly available knowledge base of adversary tactics and techniques based on real-world observations. It was orig...
Understanding the MITRE ATT&CK Framework The MITRE ATT&CK framework is a publicly available knowledge base of adversary tactics and techniques based on real-world observations. It was orig...
System calls serve as a fundamental interface between a program and the operating system. When a program needs to perform operations such as reading from a file, sending data over a network, or all...
In the dynamic field of information security, mastering the art of reconnaissance is a non-negotiable skill. As cyber threats become increasingly sophisticated, the ability to uncover hidden vulner...
In the realm of cybersecurity, preparation is key. And what better way to prepare than by simulating potential threats? Enter the cybersecurity tabletop exercise. This is a structured activity th...
Exploiting Ivanti Connect Secure RCE (CVE-2025-0282) Overview A recently disclosed vulnerability in Ivanti Connect Secure (CVE-2025-0282) has revealed a stack-based buffer overflow that enables r...
Understanding the Slowloris Attack The Slowloris attack is a type of denial-of-service (DoS) attack that targets web servers by exhausting their resources, specifically by opening and maintaining ...
Hello World This is my first blog post!