The Blog.
Long-form research.
Practitioner-written research, technical guides, and explainers for analysts, defenders, and learners. Every piece is hand-edited and updated as the threat landscape changes.
Acts and cyber law in different Countries
Hello, everyone Lucifer here for introducing you guys to cyber laws and acts available in different countries. Cyber Law is […]
Role of AI and ML in cyber security
Hello everyone welcome back to our new article where we are going to discuss, what is the role of AI […]
What is the need for Ethical Hacking
Hello, readers welcome back to another article where we are going to discuss what is the need for ethical hacking […]
Threat Intelligence Lifecycle
Hello everyone, welcome back to our new article on the threat intelligence life cycle, this article will help you in […]
What is Cyber Threat Intelligence
Hello everyone, today in this article we are going to discuss cyber threat intelligence, what is it, and how it […]
What is the Diamond Model of Intrusion Analysis
Hey everyone, today in this article we are going to discuss what is the diamond model of intrusion analysis what are […]
Apple gives security patches for two zero-day exploits
Recently Apple has released security patches for fixing 2 new zero-day vulnerabilities that can exploit to compromise the security of iPhones, Macs, […]
Cyber Kill Chain Methodology
Hello everyone lucifer here, and today in this article we are going to discuss cyber kill chain methodology which is […]
Steps and Process of Hacking Methodology
Hello everyone, lucifer here for discussing the steps and processes of hacking methodology according to the ethical hackers. how they […]