Ali Chisom

I'm always excited to take on new projects and collaborate with innovative minds.

Address

Lagos

Social Links

Blog

Jan 22, 2026 • 5 min read
Beyond Day One: Navigating the Challenges of Day One Hundred and Beyond

The journey “Beyond Day One” is where vision meets reality. It is a te...

Aug 27, 2025 • 2 min read
What is Bug Bounty Hunting? The Ethical Hacker’s Modern Gold Rush

A deep dive into why open source matters to me, how it helped me grow...

Aug 18, 2025 • 2 min read
NEW RELEASE: Digital Forensics Playbook — Beyond National Defense Standards

This playbook represents a significant evolution in digital forensics,...

May 24, 2025 • 2 min read
Real-World Incident Response: From Server Artifacts to Confirmed Compromise

A critical reminder that devastating breaches often stem from foundati...

Apr 12, 2025 • 3 min read
The MITRE ATT&CK Framework Explained: A Cyber Defender’s Secret Weapon

MITRE ATT&CK shifts security from reactive to proactive by enablin...

Mar 21, 2025 • 2 min read
Uncovering a Credential Theft Operation via SMTP Abuse

This investigation underscores that foundational services like SMTP re...

Mar 15, 2025 • 3 min read
Key Skills Every SOC Analyst Must Have in 2025

The role of a SOC analyst has evolved rapidly in response to sophistic...

Feb 02, 2025 • 2 min read
Unveiling the Hidden Threat: In-Depth Malware Analysis of dwm.bat

dwm.bat malware exemplifies the ongoing trend of attackers weaponizing...

Jan 21, 2025 • 3 min read
You open a beginner hacking guide.

The journey into cybersecurity is often derailed not by a lack of apti...

Jan 16, 2025 • 3 min read
The Role of a System Administrator in Cybersecurity: Beyond Maintenance to Cyber Resilience

Modern System Administrators have evolved from IT maintainers into ess...

Jan 14, 2025 • 3 min read
Understanding the Cyber Kill Chain: A Defender’s Guide to Outsmarting Attackers

Effective cybersecurity requires a proactive, intelligence-driven appr...

Dec 25, 2024 • 2 min read
Malware Analysis Report: KTMBE25040170.exe / Count.exe Campaign

This campaign highlights the sophistication of modern phishing threats...

Your experience on this site will be improved by allowing cookies. Cookie Policy