Category Reverse Shell

There is a shell in your lunch-box

My team was recently engaged by a client (HackMe) to perform a black-box external penetration test. The objective was simple – see how susceptible the organization is from an external...

Category Hacking

Safer Internet Day 2020

February 11 is Safer Internet Day and the theme for this year’s is “Together for a better internet”. Safer internet day is celebrated globally to promote the safe and positive...

Career Path Series - Cloud Security

On this series on career path, Mosimi interviewed cybersecurity professionals on cloud security. The cloud has changed how people use the Internet. This is especially true for companies and organizations...

Emotet Malspam Q4, 2019 campaign.

Time Frame Q4, 2019 till date (9/12/2019)

Winning Your 'Arguments' with EDRs.

A recent client engagement had me thinking about ways to evade security tools that rely heavily on command line arguments. During a red team task, I wanted to dump the...

Red Teaming with Covenant and Donut

Overview Red Teaming has rapidly transitioned from Living off the Land (LotL) to Bringing Your Own Land (BYOL). It is now possible to execute .NET assemblies entirely within memory. By...

THE USB TRAIL: ANTI-FORENSICS AND ANTI-ANTI-FORENSICS BITTER ROMANCE

This article was written for eForensics Magazine

There is a shell in your lunch-box

My team was recently engaged by a client (HackMe) to perform a black-box external penetration test. The objective was simple – see how susceptible the organization is from an external...

Category Cybersecurity meetup

NSC September Abuja MeetUp

Yassss!!!

Category Networking

NSC September Abuja MeetUp

Yassss!!!

Category Cybersecurity

A Decade of Cybersecurity in Nigeria

The way we talked about Cybersecurity in this decade was like never before. One cannot write about 10 years of Cybersecurity in Nigeria without revisiting some of the major events...

5 Creative Ways African Business Leaders can Tackle Cybersecurity Talent Shortage and Ever-Growing Brain Drain

Are you awake all-night thinking of the effects of Africa’s cybersecurity skills gap and rising brain drain on your team? It’s time to think differently.

Category Africa

5 Creative Ways African Business Leaders can Tackle Cybersecurity Talent Shortage and Ever-Growing Brain Drain

Are you awake all-night thinking of the effects of Africa’s cybersecurity skills gap and rising brain drain on your team? It’s time to think differently.

Category Talent shortage

5 Creative Ways African Business Leaders can Tackle Cybersecurity Talent Shortage and Ever-Growing Brain Drain

Are you awake all-night thinking of the effects of Africa’s cybersecurity skills gap and rising brain drain on your team? It’s time to think differently.

Category Forensics

THE USB TRAIL: ANTI-FORENSICS AND ANTI-ANTI-FORENSICS BITTER ROMANCE

This article was written for eForensics Magazine

Category Malware

Emotet Malspam Q4, 2019 campaign.

Time Frame Q4, 2019 till date (9/12/2019)

Category Red Teaming

Winning Your 'Arguments' with EDRs.

A recent client engagement had me thinking about ways to evade security tools that rely heavily on command line arguments. During a red team task, I wanted to dump the...

Red Teaming with Covenant and Donut

Overview Red Teaming has rapidly transitioned from Living off the Land (LotL) to Bringing Your Own Land (BYOL). It is now possible to execute .NET assemblies entirely within memory. By...

Category EDR

Winning Your 'Arguments' with EDRs.

A recent client engagement had me thinking about ways to evade security tools that rely heavily on command line arguments. During a red team task, I wanted to dump the...

Category Career Path

Career Path Series - Bug Bounty

On this series on career path, Mosimi interviewed cybersecurity profesionals on bug bounty. Bug bounty is a tactical path in cybersecurity that gives security researchers an opportunity to report vulnerablilites...

Careeer Path Series - Governance, Risk and Compliance (GRC)

In our second series on career path, Mosimi interviewed cybersecurity professionals in Governance, Risk and Compliance(GRC).If you missed it, check out our first series on security assessment.

Career Path Series - Security Assessmeent

Career Path Series - Security Assessment

Category Security Assessment

Career Path Series - Security Assessmeent

Career Path Series - Security Assessment

Category GRC

Careeer Path Series - Governance, Risk and Compliance (GRC)

In our second series on career path, Mosimi interviewed cybersecurity professionals in Governance, Risk and Compliance(GRC).If you missed it, check out our first series on security assessment.

Category Bug bounty

Career Path Series - Bug Bounty

On this series on career path, Mosimi interviewed cybersecurity profesionals on bug bounty. Bug bounty is a tactical path in cybersecurity that gives security researchers an opportunity to report vulnerablilites...

Category Data breaches

Data Breaches in 2019

Introduction

Category Career

20 things Cybersecurity Teams need to do better in 2020 – NaijaSecForce Edition

Cybersecurity remains a great concern and as cyber attacks continue to rise, Cybersecurity teams have the responsibility of protecting IT infrastutures, networks and data among others from cyber attacks. For...

Category cloud security

Career Path Series - Cloud Security

On this series on career path, Mosimi interviewed cybersecurity professionals on cloud security. The cloud has changed how people use the Internet. This is especially true for companies and organizations...

Category safer internet

Safer Internet Day 2020

February 11 is Safer Internet Day and the theme for this year’s is “Together for a better internet”. Safer internet day is celebrated globally to promote the safe and positive...