Ali Chisom

I'm always excited to take on new projects and collaborate with innovative minds.

Address

Lagos

Social Links

System Administration

Aug 27, 2025 • 2 min read
What is Bug Bounty Hunting? The Ethical Hacker’s Modern Gold Rush

A deep dive into why open source matters to me, how it helped me grow...

May 24, 2025 • 2 min read
Real-World Incident Response: From Server Artifacts to Confirmed Compromise

A critical reminder that devastating breaches often stem from foundati...

Apr 12, 2025 • 3 min read
The MITRE ATT&CK Framework Explained: A Cyber Defender’s Secret Weapon

MITRE ATT&CK shifts security from reactive to proactive by enablin...

Jan 14, 2025 • 3 min read
Understanding the Cyber Kill Chain: A Defender’s Guide to Outsmarting Attackers

Effective cybersecurity requires a proactive, intelligence-driven appr...

Dec 23, 2024 • 2 min read
Web Server Threat Detection: Attempted Remote Code Execution via PHPUnit Exploit

A reminder that 404 can be a goldmine of intelligence in the hands of...

Your experience on this site will be improved by allowing cookies. Cookie Policy