If cyber threats had a most-wanted list, Chip would be the detective cracking the case! My blog dives deep into the world of cyber intelligence, unraveling attacks, trends, and security tactics with a mix of wit and wisdom. Whether you’re a seasoned pro or just cyber-curious, expect insights that pack a punch—no fluff, just the good stuff!
-
Hash Values – A Trivial Artefact
Readers! Merry Christmas and Happy new year to all. The days of holiday spam and vendor predictions are here. Here I am spending summer afternoon watching TV and writing on my blog. As I am bit lazy during holidays I am posting something simple. The post is about HASH values… Read More ⇢
-
SANS FOR578 Cyber Threat Intelligence – Course Review
Readers!!! Advanced greetings for Christmas. Before I start make sure to check out SANS Holiday Hack Challenge here. Recently, I was honoured to attend one of the SANS course For578 – Cyber Threat Intelligence. SANS instructor was one of the best in business Robert M. Lee. My reason to attend… Read More ⇢
-
Evoltin POS Malware – Kill Chain Mind Map
Readers!!! Its been quite a while I have updated my blog posts, due to me spending some quality time off the work and being with family. Recently, was honoured to attend SANS FOR578 Cyber Threat Intelligence course taught by Robert M. Lee and it was excellent. I will be writing… Read More ⇢
-
Forensics – Where to start and What to know
Readers I would like to share my experience and understanding with regards to forensics and where I started to get a foothold in forensics. Questions that I normally get : I want to get into forensics. What should I study? What kind of certificates are good? What background should I… Read More ⇢
-
Disposable email addresses (DEA) and concerns
Readers This post is about disposable email addresses and where to get them and concerns for organisations or whitehats defending their network/country. Disposable email addresses are something for which you don’t need an account. Understand you can only RECEIVE emails and cannot SEND. The service was first paid only but… Read More ⇢
-
Battling Insider Threats – Browser in the box
Readers One of the biggest threats for any organisation is Insider Threat. An employee visiting malicious sites, drive-by downloads, uploading documents etc. , in short any web activity that can impact the organisation. Many of the organisations have chose to deploy DLP, Intrusion Detection and Prevention systems, proxies, user behaviour analytics… Read More ⇢
-
Incident Response and Forensics – The two towers
Readers Been meaning write something about my experience with Incident response and forensics and how knowledge of both field helped me. Most of the organisations have Incident Response and Forensics as 2 different department and no overlap of services or transparency is seen between them. Personally, I believe it is… Read More ⇢
-
Penetration Testing and Rules of engagement
Readers This post is about globally accepted LEGAL technique to exploit a system or network to validate their deployment of security controls. Yes I am talking about PENETRATION TESTING. With this post I would like to share an ideal approach during penetration testing and importance in following the rules of… Read More ⇢
-
Ransomware extensions and filenames
As we all know Ransomware is currently one of the biggest threat to any organisation and therefore we must understand how a ransomware works and its digital footprint. Every application when executed leaves a footprint on the system and sometimes we call them dropper. A footprint for Microsoft word is… Read More ⇢


