Phishing: How Easy It Is to Get Compromised

Phishing: How Easy It Is to Get Compromised

Phishing remains the number one attack vector for credential theft, malware deployment, and corporate breaches.

Building a Custom SIEM: Threat Detection with Splunk

Building a Custom SIEM: Threat Detection with Splunk

I was tasked with building a custom security monitoring environment using Splunk for Virtual Space Industries (VSI).

Digital Forensics

Digital Forensics

To conduct the forensic investigation, I used Autopsy, Kali Linux & SQLight Browser.

Using Splunk for Security Monitoring

Using Splunk for Security Monitoring

This hands-on experience reinforced my ability to leverage Splunk for real-world security monitoring and incident response.

Penetration Test Engagement for Rekall Corporation

Penetration Test Engagement for Rekall Corporation

This penetration test demonstrated my ability to conduct real-world vulnerability assessments and exploit system weaknesses across multiple environments such as Windows and Linux servers as well as web applications.

Penetration Test Engagement for MegaCorpOne

Penetration Test Engagement for MegaCorpOne

This post outlines the phases of the assessment, the tools used, and key takeaways. The full penetration test report is available at the end.

Azure Cloud Security

Azure Cloud Security

By leveraging Azure’s cloud infrastructure, I built a segmented, controlled environment that allows security assessments without unnecessary exposure. This setup mirrors real-world enterprise environments, where security, scalability, and reliability are essential.

Investigating a Malware Attack

Investigating a Malware Attack

In this case study, I investigated an alert triggered on our Security Onion system, indicating a potential malware infection. This blog post walks through my approach to analyzing the incident, understanding the attack methodology, and recommending mitigation strategies.

Assessing Security Culture

Assessing Security Culture

Security culture is one of the most critical aspects of an organization’s cybersecurity posture. Despite technological advancements in security solutions, the human factor remains the weakest link.