Posts
Forensic Script Output Parser
-This article introduces — CSV-Sploiter a tool which I built with Lovable (zero code free subscription. CSV-Sploiter takes CSV files containing collected artefacts and displays them in a clean, Splunk-style searchable interface. Let’s say your manager hands you a windows computer that is suspected to be compromised. They want to...
Read more →
Verifying Detection Coverage for APT28
APT28 is an infamous group linked to the Russian Intelligence Services MITRE Group G0007. This APT group has been involved in several highly sophisticated cyberattacks and was recently reported to have exploited a Microsoft Office bypass vulnerability (CVE-2026-21509. To protect your organization’s assets from APT28, it is crucial to understand...
Read more →
Cryptography
Cryptography vs Encryption Cryptography is the broader field for encryption, digital signatures, hash functions, and more in order to protect data from unauthorized access or modification. Encryption, on the other hand, is a specific cryptographic technique that involves converting plaintext into ciphertext using an encryption algorithm and a secret key....
Read more →
Microsoft Security Operations Analyst
- My personal notes about Microsoft SC-200 certification Microsoft 365 Defender: Microsoft 365 Defender is an XDR from Microsoft and a unified suite of tools providing enterprise level security for pre and post-beach. Microsoft 365 provides support for all stages of a compromise for example, detection, investigation, prevention, response across...
Read more →
Azure Fundementals
- My personal notes about Microsoft AZ-900 certification Azure Fundamentals Summary (AZ-900 Cloud services and cloud computing Cloud computing utilizes remote servers instead of on-premise infrastructure. It’s in high demand due to its cost-effectiveness, security, and 24/7 availability. Major providers like Azure, Amazon, and Google offer a range of services...
Read more →
Microsoft Identity and Access Administrator
- My personal notes about Microsoft SC-300 certification Identity Provider (IdP Is a system or application that creates, manages and stores digital identities (Users, accounts or services. Microsoft Entra ID is an example of Identity Provider. An Identity Provider verifies user identities using one or more authentication factors such as...
Read more →