top of page

CYBER & INFOSEC
"blogger, InfoSec specialist, super hero ... and all round good guy"
DISCUSSIONS, CONCEPTS & TECHNOLOGIES FOR THE WORLD OF
JOIN THE DISCUSSION
Search


Podcast: The Cyberwar with Iran
Catch up on recent discussions highlighting the significant and evolving cyber threat posed by Iran
2 days ago1 min read
0 comments


Podcast: Unpacking Cybersecurity Careers
Dive into a conversation around how to get started with your cybersecurity career. Click on the link to listen to the latest podcast:...
2 days ago1 min read
0 comments


My RSA 2025 Recap
RSA Conference 2025 delivered a clear message: the next frontier in cyber defense—and offense—is Agentic AI. Okay what is Agentic AI...
May 63 min read
1 comment


Another getting started with CyberSecurity and Ethical Hacking Jan 2025
I’m often asked by folks just getting started in cybersecurity about the best way to begin their journey. Honestly, I sometimes feel like...
Jan 144 min read
14 comments


Installing RDP on Kali Linux
Enabling Remote Desktop Protocol (RDP) on Kali Linux allows you to access the system remotely with a graphical interface. Below is a...
Dec 27, 20243 min read
11 comments


Installing Shell-GPT SGPT (ChatGPT) on Kali for Hacking - AI ChatGPT powered hacking
The first step is to update your system. Assuming you have a relatively new build of Kali and a simple apt-get update and upgrade...
Dec 26, 20243 min read
2 comments


Understanding SGPT on Linux: When, How, and Why It Outshines ChatGPT
Artificial Intelligence (AI) has transformed how we interact with technology. Large language models (LLMs) are among the most prominent...
Nov 21, 20244 min read
2 comments


Midnight Blizzard: Guidance for responders on nation-state attack
Microsoft research posted a very interesting blog post on a current nation state threat being tagged as Midnight Blizzard. Who is this...
Mar 5, 20241 min read
2 comments


AI used to fake voices of loved ones in “I’ve been in an accident” scam
Phishing continues to be the number one attack vector and impersonation attacks are not new. What is interesting is how there are threat...
Feb 29, 20242 min read
1 comment
bottom of page