Nowadays, IT technical skills and knowledge are needed within the HealthCare industry especially hospitals, primary, pharmaceutical companies and so on. The changes happened due to pandemic-driven changes where staff are normally working from home. VP of Innovation at Masergy, Ray Watson have explained Healthcare IT teams […]
I will share my experience on the Cloud Implementation Best Practices which don’t apply to any of my previous, or current organizations. My options would be off for certain organizations and individuals. Below are my top 5 Best Practice that needs to implement in Cloud Environment. […]
Recently, there is news about attackers who have compromised data on COVID-19 vaccinations on the European Medicines Agency (EMA) which is connected to the internet. For those that never heard about EMA, it’s an agency of the European Union which normally manages the evaluation and supervision […]
On this post, I would discuss the Red Teaming activity where some organization will be using those team to test the system or application. For those are not familiar with the terms “Red Teaming”, it s a team which will be focusing on multi-layered attack simulation […]
On this post, I would like to share the trick to tackle Basic Pentesting. The objective of this machine would be to gain skills and knowledge on web application hacking and privilege escalation. From the information that we can see above, we can predict that the […]
I’m sure that most of the people know what Automated Teller Machine (ATM) is and what is used in our daily life. Just for a reminder for those are not familiar with ATM, so Automated teller machine (ATM) is an electronic banking outlet where it will […]
In this post, i would like to share one attack method that will take advantage on QR Code which called Quick Response Code Login Jacking (QRLJacking). QRLJacking is a new method that most people might not even heard before. QRLJacking is a direct and easy social […]
Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the data is been protected while surfing on the internet. An attacker can disrupt the organization’s activity and compromise the data within […]
In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and Penetration Tester Resource. SOC Analyst I have experience working in one organization as a SOC analyst which surely a lot of […]