Published inInfoSec Write-upsIdentify Malware Threats: Malware Terminology (Part 2)This is the part II of my Malware Terminology blog series.🥰 In my previous blog Identify Malware Threats: Malware Terminology (Part 1…Jul 2, 2021Jul 2, 2021
Published inInfoSec Write-upsHow to enable Azure Multi-Factor AuthenticationThis blog contains a walkthrough of How to secure user sign-in events with Azure AD Multi-Factor Authentication.Mar 13, 2021Mar 13, 2021
Published inInfoSec Write-upsWhat do you know of Security in Azure? |Azure Security Practices ☁️Let’s look at the problem, what is it really what we are trying to secure when talking about azure 🤗The best way to look into these…Mar 10, 2021Mar 10, 2021
Published inInfoSec Write-upsIdentify Malware Threats: Malware Terminology (Part 1: Viruses and Worms)With the arising technology in the world, the main impact of cybersecurity in the IT industry is malware. As the new technology is…Feb 15, 2021Feb 15, 2021
Published inInfoSec Write-upsHow to start Bug Bounty?Simple Methodology to follow when starting bug bountyNov 5, 2020Nov 5, 2020