-
Oct 12, 2024
If you’ve been following my blog for a while, you know I usually dive deep into the latest cybersecurity and technology trends. But today, we’re taking a bit of a detour. For those who know me personally, it’s no secret… read more »
-
Sep 28, 2024
In recent years, the quest for work-life balance has often been seen as the Holy Grail of professional success and personal fulfilment. But what if I told you that work-life balance is a myth? The idea of perfectly dividing time… read more »
-
Sep 22, 2024
Disclaimer: The following story is entirely fictional. Before we embark on this rollercoaster ride of hypothetical incompetence, let me assure you that any resemblance to actual persons, living or dead, or actual events is purely coincidental. Really. I mean it.… read more »
-
Sep 18, 2024
As phishing attacks become more sophisticated, investigators and security professionals need innovative techniques to identify and combat these threats. In this article, we look at an often overlooked method: using favicon hashes in conjunction with Shodan to uncover potential phishing… read more »
-
Sep 14, 2024
Disclaimer The following story is a work of fiction. Any resemblance to actual persons, living or dead, or actual events is purely coincidental. …Or is it? In the midst of the COVID-19 pandemic, when remote work had become the norm,… read more »
-
Sep 10, 2024
With Apple’s upcoming release of macOS Sequoia on September 16th, the field of Digital Forensics and Incident Response faces new challenges and opportunities. Introduction to macOS Sequoia macOS Sequoia, the latest iteration of Apple’s desktop operating system, brings a host… read more »
-
Sep 8, 2024
As teams grow more diverse and projects become increasingly complex, managers face the challenge of ensuring that every team member contributes, develops, and feels valued. My mantra in these situations is “No one should be left behind”. Understanding the “No… read more »
-
Sep 5, 2024
Incident response and digital forensics play crucial roles in understanding, mitigating, and preventing security events. However, a common pitfall that can undermine even the most sophisticated investigative efforts is the practice of “cherry picking” – selectively choosing evidence that supports… read more »