Recent Posts

Posted in Vulnerabilities

New Ransomware active – Black Claw Ransomware

A new Ransomware called Black Claw has been active a lot in March this year which the ransomware has a similar threat like any other…

Continue Reading...
Posted in Information Security

MITRE ATT&CK Knowledge

Some people will have an urge to know what is MITRE ATT&CK all about and what those methods can do within the cybersecurity field. Let’s…

Continue Reading...
Posted in News

New Ransomware: Tycoon has merged

Researchers at BlackBerry which work with security analysts at KPMG have uncovered a new form of ransomware that called Tycoon which will be exploiting Windows…

Continue Reading...
Posted in News

Windows 10 Exploit has been confirmed as Critical

Recently, there have some news that related to Windows 10 Exploit been considered as Critical after the Emergency Microsoft’s Update. The vulnerabilities have been disclosed…

Continue Reading...
Posted in Information Security

Importance of Security in Domain Name

Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the…

Continue Reading...
Posted in Vulnerabilities

Vulnerabilities that been published within 4 years ago

For the past three years, a lot of vulnerabilities have been published in the security advisory to alert the user about the vulnerabilities. From the…

Continue Reading...
Posted in Information Security

CyberSecurity Experience

In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and…

Continue Reading...
Posted in Forensic

Autopsy Forensic Tools Review

In this post, I would like to share what I have gained during the training which might help people out there. A couple of weeks…

Continue Reading...
Posted in Information Security

Security Standards

What is Cyber Security Standards? When talking about Cybersecurity Standards, a lot of people out there will think only ISO standards which will cover the…

Continue Reading...
Posted in Information Security

Threat Hunting vs Threat Intelligence

Threat Hunting Threat hunting can be labeled as a process that looking for any bad actors on the network connection actively. Threat hunting will be…

Continue Reading...