The Blog.
Long-form research.
Practitioner-written research, technical guides, and explainers for analysts, defenders, and learners. Every piece is hand-edited and updated as the threat landscape changes.
Acts and cyber law in different Countries
Hello, everyone Lucifer here for introducing you guys to cyber laws and acts available in different countries. Cyber Law is very necessary for governing and regulating the use of the Internet and other electronic comm…
Role of AI and ML in cyber security
Hello everyone welcome back to our new article where we are going to discuss, what is the role of AI and ML in cyber security and how they help us to prevent many types of cyber attacks before they performed…
What is the need for Ethical Hacking
Hello, readers welcome back to another article where we are going to discuss what is the need for ethical hacking in a real-life scenario. This will help you to understand all the needs and concepts for ethical hackin…
Threat Intelligence Lifecycle
Hello everyone, welcome back to our new article on the threat intelligence life cycle, this article will help you in understanding the different phases in the threat intelligence life cycle. The threat intelligence li…
What is Cyber Threat Intelligence
Hello everyone, today in this article we are going to discuss cyber threat intelligence, what is it, and how it helps a security researcher, in the real-life scenario for analyzing threat behavior. So basically, …
What is the Diamond Model of Intrusion Analysis
Hey everyone, today in this article we are going to discuss what is the diamond model of intrusion analysis what are the real-life scenarios where this will use Show basically a diamond model of intru…
Apple gives security patches for two zero-day exploits
Recently Apple has released security patches for fixing 2 new zero-day vulnerabilities that can exploit to compromise the security of iPhones, Macs, and iPads. Apple is aware of the report that this issue may have bee…
Cyber Kill Chain Methodology
Hello everyone lucifer here, and today in this article we are going to discuss cyber kill chain methodology which is used by security researchers to prevent any type of cyber attacks. The cyber kill chain methodology …
Steps and Process of Hacking Methodology
Hello everyone, lucifer here for discussing the steps and processes of hacking methodology according to the ethical hackers. how they can beat hackers from proceeding with any type of cyber attack.