




Machine Learning for Cybersecurity
Everything about Machine Learning for Cybersecurity and in-between.

Vulnerabilities vs. Security Misconfigurations: An Essential Primer
When you hear the term “security breach,” chances are that risks like malware or ransomware attacks come to mind. These exploits tend to feature in headlines about major cybersecurity attacks.

Methodology for Malware Static analysis: Portable Executable (PE) files
Malware analysis determines if a program/file is malicious. There are two phases in malware analysis.

Four Questions Your Information Security Team Should be Asking
The key to succeeding in information security and cyber threat intelligence is recognizing what you’re dealing with, and adapting accordingly.

Securing Microsoft Azure AD with FIDO2 Keys — Passwordless Authentication
Azure AD is a powerful cloud-based IdP from Microsoft that many organizations have “free” access to through their M365 subscriptions for Office 365 / Exchange Online.

Deciphering A Caesar Cipher with Python
Caesar ciphers map out characters to other characters based on a number key chosen by the designer of the Caesar cipher.