Ali Chisom

I'm always excited to take on new projects and collaborate with innovative minds.

Address

Lagos

Social Links

Blog

Feb 14, 2026 • 2 min read
The Hacker's Mindset Part 3 / Final
Feb 14, 2026 • 2 min read
The Hacker's Mindset Part 2
Feb 14, 2026 • 2 min read
The Hacker's Mindset Part 1
Feb 11, 2026 • 2 min read
Malware Analysis Deep Dive: GhostWeaver RAT (PowerShell Crypto-Infostealer)

In-depth analysis of a highly obfuscated PowerShell-based infostealer...

Jan 22, 2026 • 5 min read
Beyond Day One: Navigating the Challenges of Day One Hundred and Beyond

The journey “Beyond Day One” is where vision meets reality. It is a te...

Aug 27, 2025 • 2 min read
What is Bug Bounty Hunting? The Ethical Hacker’s Modern Gold Rush

A deep dive into why open source matters to me, how it helped me grow...

Aug 18, 2025 • 2 min read
NEW RELEASE: Digital Forensics Playbook — Beyond National Defense Standards

This playbook represents a significant evolution in digital forensics,...

May 24, 2025 • 2 min read
Real-World Incident Response: From Server Artifacts to Confirmed Compromise

A critical reminder that devastating breaches often stem from foundati...

Apr 12, 2025 • 3 min read
The MITRE ATT&CK Framework Explained: A Cyber Defender’s Secret Weapon

MITRE ATT&CK shifts security from reactive to proactive by enablin...

Mar 21, 2025 • 2 min read
Uncovering a Credential Theft Operation via SMTP Abuse

This investigation underscores that foundational services like SMTP re...

Mar 15, 2025 • 3 min read
Key Skills Every SOC Analyst Must Have in 2025

The role of a SOC analyst has evolved rapidly in response to sophistic...

Feb 02, 2025 • 2 min read
Unveiling the Hidden Threat: In-Depth Malware Analysis of dwm.bat

dwm.bat malware exemplifies the ongoing trend of attackers weaponizing...

Your experience on this site will be improved by allowing cookies. Cookie Policy