Tcpdump Zero to Hero, Part1 Commands & Options

In this article, I will delve into one of the most indispensable tools in my networking arsenal: tcpdump. While mastering this tool entirely is a complex endeavor, understanding the basic functionalities is straightforward and can serve as a solid foundation for exploring more intricate aspects of network analysis. This article will be divided into two … Read more

Numo Cybersecurity Program Mentorship

Location Dubai, UAE Date 7 March 2022 Organizer Abdulla Al Ghurair Foundation Level Entry Duration 4 Hours About I had the privilege to be part of the Nomu Cyber Graduation Ceremony as one of the mentors, honoring the remarkable achievements of 70 skilled Arab cybersecurity professionals! Immense thanks to the Abdulla Al Ghurair Foundation for … Read more

Setup VMWare ESXi 7 and installation of Windows 11

Introduction VMware ESXi stands out as a premier type-1 hypervisor, designed to facilitate virtualization by permitting numerous virtual machines to operate on a single physical host. Being a bare-metal hypervisor, it has the unique capability to function directly atop the server hardware without dependency on any underlying operating system. This results in heightened efficiency and … Read more

No More Passwords for Android Users! Google Passkeys.

Google has taken the next step towards a Passwordless future by announcing the arrival of passkeys. Passkeys are a new cryptographic key solution that requires a pre-authenticated device. They are now available to Google account users on all major platforms. Starting today, Google users can switch to passkeys and ditch their passwords and two-step verification codes entirely when signing … Read more

Twitter Source Code Leak: A Major Security Breach on GitHub

Introduction Recently, a shocking revelation has surfaced: the source code for Twitter, the popular microblogging platform, was leaked on GitHub, a web-based platform for version control using Git. This significant security breach has raised concerns about the potential implications for Twitter, its users, and the broader software development community. The Leak On March 24, 2023, … Read more

Understanding Network Design Engineering

Unfortunately, one of the common mistakes in network design is the lack of sufficient understanding of how networks operate. This can lead to the application of misconceptions in their protection. Additionally, the integration of non-traditional IT assets such as smart door locks, refrigerators, and TVs introduces new challenges. Therefore, the adage “Know the system” is … Read more

Importance of information security for companies and businesses seminar

Location Turkey Date May 4 2022 Organizer ASSIAD Level Entry Duration 4 Hours About As part of our ongoing commitment to enhancing the capacity of Arab businessmen & industrialist in Turkey “ASSIAD” member companies, we are pleased to present an enlightening symposium on the critical importance of information security for commercial and industrial entities. Our … Read more

Burglary and Wars with No Blood. Where are Cyberattacks Leading Us? 

On May 7, the American company Colonial Pipeline stopped its work process due to a cyberattack initiated by ransomware. The cyberattack targeted the applications and systems responsible for controlling the procedure of pumping the oil derivatives through the pipelines that belong to the company, which are considered the longest pipelines in the United States, with a … Read more

Noticeable increase in WeTransfer phishing attacks threatens bank accounts.

Introduction In recent times, the cybersecurity landscape has witnessed a significant uptick in malicious activities, particularly through email phishing attacks. These attacks often carry malicious payloads, which are ingeniously designed to infiltrate critical infrastructures. The consequence of such breaches is not just limited to system compromises but extends to severe data breaches impacting both individuals … Read more