Ali Chisom

I'm always excited to take on new projects and collaborate with innovative minds.

Address

Lagos

Social Links

Cybersecurity

Mar 15, 2025 • 3 min read
Key Skills Every SOC Analyst Must Have in 2025

The role of a SOC analyst has evolved rapidly in response to sophistic...

Feb 02, 2025 • 2 min read
Unveiling the Hidden Threat: In-Depth Malware Analysis of dwm.bat

dwm.bat malware exemplifies the ongoing trend of attackers weaponizing...

Jan 21, 2025 • 3 min read
You open a beginner hacking guide.

The journey into cybersecurity is often derailed not by a lack of apti...

Jan 16, 2025 • 3 min read
The Role of a System Administrator in Cybersecurity: Beyond Maintenance to Cyber Resilience

Modern System Administrators have evolved from IT maintainers into ess...

Jan 14, 2025 • 3 min read
Understanding the Cyber Kill Chain: A Defender’s Guide to Outsmarting Attackers

Effective cybersecurity requires a proactive, intelligence-driven appr...

Dec 25, 2024 • 2 min read
Malware Analysis Report: KTMBE25040170.exe / Count.exe Campaign

This campaign highlights the sophistication of modern phishing threats...

Dec 23, 2024 • 2 min read
Web Server Threat Detection: Attempted Remote Code Execution via PHPUnit Exploit

A reminder that 404 can be a goldmine of intelligence in the hands of...

Nov 12, 2024 • 3 min read
Common Cyber Threats Every SOC Analyst Should Know

SOC analyst effectiveness relies on transforming reactive monitoring i...

Nov 09, 2024 • 3 min read
Life in the SOC: The Unseen Warriors Defending Digital Frontlines

A step-by-step guide on how beginners can start contributing to open s...

Nov 04, 2024 • 2 min read
Malware Analysis Lesson Learned (the hard way 😅)

Real-world lesson in the non-negotiable principles of safe malware ana...

Your experience on this site will be improved by allowing cookies. Cookie Policy