Hassen HannachiTop Cyber Security GPTs & How to Use ThemOpenAI recently started allowing users to create their own custom chatbots called GPTs (Generative Pre-Trained Transformers). This has led…Jul 10, 2024Jul 10, 2024
Hassen HannachiUltimate Guide — Linux Logging BasicsOperating system logs provide a wealth of diagnostic information about your computers, and Linux is no exception. Everything from kernel…May 22, 2024May 22, 2024
Hassen HannachiUltimate Guide — Windows Logging BasicsLogs are records of events that happen on your computer, either by a person or by a running process. They help you track what happened and…May 15, 2024May 15, 2024
Hassen HannachiSOC Analyst — Job Description, Skills and 5 Key ResponsibilitiesA SOC Analyst, also known as a Security Operations Center Analyst, is an IT security focal tasked with monitoring an organization’s…Apr 9, 2024Apr 9, 2024
Hassen HannachiOWASP Top 10 for 2023 — What’s NewThe need for application security has never been greater. In a world where technology is ubiquitous and applications are key to day-to-day…Mar 7, 2024Mar 7, 2024
Hassen HannachiOWASP Top 10: Understanding the Most Critical Application Security RisksDefinitionFeb 29, 2024Feb 29, 2024
Hassen HannachiEnhancing your threat detection capabilitiesThreat detection is arguably one of the most important aspects of a comprehensive cyber security strategy. If you are unable to identify…Feb 25, 2024Feb 25, 2024
Hassen HannachiELI5: Explain like I’m Five — Cyber Kill ChainIn the Cyber security field, one must be aware of the methods and strategies used by cybercriminals in order to protect, detect attacks and…Feb 28, 2024Feb 28, 2024
Hassen HannachiCyber Kill Chain — Offensive and Defensive ApproachThis is the follow-up blog of the previous one: ‘ELI5: Explain like I’m Five — Cyber Kill Chain’. Check it out if you haven’t already…Feb 28, 2024Feb 28, 2024