A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of internet traffic. DDoS attacks are executed using multiple compromised computer systems, often referred to as a botnet, which are controlled by the attacker. These botnets Read More …
Category: Learn
Malware TV – Reverse Engineering
CTF Field Guide Alex Sotirov, Reverse Engineering 1, Fall 2011
Month of AI Video – Practical LLM Security
Practical LLM Security As large language models (LLMs) become increasingly integrated into various applications, the security standards for these integrations have not kept pace. Much of the current security research tends to focus on either 1) the social harms and biases associated with LLMs, along with content moderation issues, or 2) the LLMs themselves, often Read More …
LLM – Large Language Model
A non-technical definition………. Imagine you have a friend who is an incredible storyteller. This friend has read thousands of books, articles, and conversations, absorbing all kinds of information about the world. When you ask them a question or give them a topic, they can quickly come up with a thoughtful response, tell a story, or Read More …
Notes – GitHub Actions
GitHub Actions is a powerful automation platform built directly into GitHub. It allows you to automate workflows within your software development life cycle, right in your repositories. Here’s a breakdown of what it is: Core Functionality: Automation of Workflows: GitHub Actions enables you to create automated workflows that respond to events within your GitHub repository. These Read More …
AZ 900 – Part I – Microsoft Azure Cloud Concepts
Microsoft Azure Cloud Concepts Cloud Service Models Types of Cloud Computing Benefits of the Cloud Fundamental characteristics of cloud computing Cloud computing offers convenient, on-demand access to your computing resources online. This has facilitated the move to remote work and supports collaboration wherever you are located. For IT teams, cloud services also make technological provisioning Read More …
Notes – Pipelines and Building Blocks
In the context of data processing and DevOps, “pipelines” are sequential processes like assembly lines that automate tasks (building, testing, and deploying code) and “building blocks” are the modular components that make up the pipeline, performing specific tasks. Here’s a more detailed explanation: Data Pipelines: A data pipeline is a system of automated processes that move Read More …
YAML – Yet Another Markup Language
In computer programming, YAML stands for YAML Ain’t Markup Language (it was originally intended to mean “Yet Another Markup Language”). It is a human-readable data serialization language. This means it’s designed to represent data in a format that is easy for humans to read and write, while also being easily parsed by computers. Here’s a Read More …
Incident Response Tabletop Idea
This is a scenario based incident response tabletop that I worked on with a colleague. I wanted to share with the world, as I have had immense success with this. It amazes me how a simple dice roll, really draws people in to the event. It sounds silly, but the sense of chance adds so Read More …
ESM – Exposure Surface Management
Exposure Surface Management (ESM) aims to proactively identify, assess, and mitigate vulnerabilities across an organization’s digital assets, including those external to the traditional IT infrastructure, to reduce the risk of cyberattacks. Here’s a breakdown of what ESM looks like: Comprehensive Asset Inventory: ESM starts with a thorough inventory of all assets, both internal and external, Read More …