Ali Chisom

I'm always excited to take on new projects and collaborate with innovative minds.

Address

Lagos

Social Links

Cybersecurity

Feb 14, 2026 • 2 min read
The Hacker's Mindset Part 3 / Final
Feb 14, 2026 • 2 min read
The Hacker's Mindset Part 2
Feb 14, 2026 • 2 min read
The Hacker's Mindset Part 1
Feb 11, 2026 • 2 min read
Malware Analysis Deep Dive: GhostWeaver RAT (PowerShell Crypto-Infostealer)

In-depth analysis of a highly obfuscated PowerShell-based infostealer...

Aug 27, 2025 • 2 min read
What is Bug Bounty Hunting? The Ethical Hacker’s Modern Gold Rush

A deep dive into why open source matters to me, how it helped me grow...

Aug 18, 2025 • 2 min read
NEW RELEASE: Digital Forensics Playbook — Beyond National Defense Standards

This playbook represents a significant evolution in digital forensics,...

May 24, 2025 • 2 min read
Real-World Incident Response: From Server Artifacts to Confirmed Compromise

A critical reminder that devastating breaches often stem from foundati...

Apr 12, 2025 • 3 min read
The MITRE ATT&CK Framework Explained: A Cyber Defender’s Secret Weapon

MITRE ATT&CK shifts security from reactive to proactive by enablin...

Mar 15, 2025 • 3 min read
Key Skills Every SOC Analyst Must Have in 2025

The role of a SOC analyst has evolved rapidly in response to sophistic...

Feb 02, 2025 • 2 min read
Unveiling the Hidden Threat: In-Depth Malware Analysis of dwm.bat

dwm.bat malware exemplifies the ongoing trend of attackers weaponizing...

Jan 21, 2025 • 3 min read
You open a beginner hacking guide.

The journey into cybersecurity is often derailed not by a lack of apti...

Jan 16, 2025 • 3 min read
The Role of a System Administrator in Cybersecurity: Beyond Maintenance to Cyber Resilience

Modern System Administrators have evolved from IT maintainers into ess...

Your experience on this site will be improved by allowing cookies. Cookie Policy