Latest Articles

recent articles about cyber security

22 April, 2024

Golden Ticket Attack

The Golden Ticket Attack exploits vulnerabilities in Microsoft’s Active Directory authentication system, which serves as the cornerstone of identity management in many organizations. Active Directory stores information about users, groups, and network resources

Read More
03 March, 2024

The Unforeseen: Emergent Behavior in AI

AI emergent behavior arises when simple algorithms or components interact in intricate ways, leading to unexpected outcomes. It’s like a colony of ants building an intricate network without a central planner.

Read More
24 August, 2023

Decoding Genius: Alan Turing’s Cryptographic Odyssey

the chronicles of history, certain individuals leave an enduring mark on the world, and among them, Alan Turing stands as a shining example. He is an extraordinary mathematician, logician, and computer scientist.

Read More
o2 February, 2023

The power of Blue Teaming

Blue teaming is a defensive cybersecurity strategy that involves proactively identifying and mitigating potential security threats. It’s called blue teaming because the name was inspired by military strategy.

Read More
26 January, 2023

Beyond Penetration Testing: Red Teaming

Red teaming is a powerful tool for organizations to identify vulnerabilities and weaknesses in their systems and processes. It involves simulating a realistic attack.

Read More
14 Jul, 2022

Social Engineering: The Art of exploiting humans

Social engineering is an attack type that heavily relies on human actions. This type of attack lets the attackers manipulate fake environments and break regular security measurements.

Read More
01 August, 2021

Deepfake Technology

Deepfake technology is powered by the most advanced technological methodologies of Artificial intelligence and machine learning. The main task of this technology is, generating hyper-realistic fake content.

Read More
18 February, 2021

Introduction to Kali Linux

Kali Linux is an operating system based on another free operating system called Debian. Kali Linux specially developed for information security tasks such as penetration tests and security auditing and researches.

Read More

Pasindu Bandara

Cyber Security Enthusiast

I am a hardworking and ambitious individual with a great passion for Information Technology and Cyber Security. I always try to use a creative approach to problem solve. I have excellent communication skills, which support me to effectively communicate with others. I like to convert my fresh ideas in to reality. Because creative thinking is also my hobby.