The Blog.
Long-form research.
Practitioner-written research, technical guides, and explainers for analysts, defenders, and learners. Every piece is hand-edited and updated as the threat landscape changes.
What is information Warfare? Explanation and Types
Hello everyone lucifer here, to discuss the topic that is information warfare. It is a general term that is used […]
5 Types of Information Security Attacks
Hello, everyone lucifer is here to discuss a very important topic in information security which is the classification of security […]
6 important Pillars of Information Security
Hello everyone lucifer here with a topic of pillars of information security. Pillars are like the base on which any […]
Network Ports and their services
This article will describe the most common network service and network ports. Ports are like small rooms in your whole […]
What is deep web, dark web and surface web?
Hello everyone lucifer here, and today in this article I am going share my views and study about deep web, […]
What is VPN and Proxy
hello, Lucifer here, and today we will discuss VPNs and proxies. In this article, we will discuss everything related to […]
How to make a virus with notepad
Hello guys 🙂 lucifer here, and today in this article I will show you the techniques and scripts to create […]
How to start a career in Cyber Security in 2025
Hi everyone, lucifer here with a topic, which is asked by every newcomer while entering the field of cyber security. […]
How to use NMAP for penetration testing
Hello there, in this article we are to discuss nmap which is generally a network mapper tool for collecting different […]