Tag cybersecurity

Yara writeup – TryHackMe

YARA (Yet Another Ridiculous/Recursive Acronym) is a great open-source resource (and language) designed for creating and sharing pattern matching rules. One of the most popular uses for YARA rules is to identify and classify files or data based on specific…

Email aliases, online identity and threat modelling

Until not long ago, I didn’t think twice about sharing my old (then main) Gmail email address with literally any and every service I’d come across in the internet. A 10% discount for sharing my email with this questionable eCommerce…

I joined the (ISC)² on an exam writing workshop

Recently, I had the amazing opportunity to collaborate with (ISC)², the renowned cybersecurity nonprofit that specializes in cybersecurity certifications. Shortly after earning my Certified in Cybersecurity credential and becoming an (ISC)² member, I was invited to join them as a…

Email authentication through SPF, DKIM and DMARC

Email is flawed, and threat actors know this very well. Email was originally created over 50 years ago, and whilst it has evolved quite a lot during this time, email is still far from being as secure as other communication…