PinnedTIME TO PIVOT?It has been a while since I wrote on here. Well, I took time off to evaluate my strengths and passion in the tech space. I was also at the…Sep 29, 2023Sep 29, 2023
SLOW DOWN!Recently I was having a chat with a couple of friends over a nice branch at an Eritrean-themed restaurant in Westlands. Allow me to dwell…Jun 22, 2022Jun 22, 2022
Day 10: Insufficient logging and monitoringPlease note: This is part ten of a 10-part series on TryHackMe OWASP top 10 roomJun 15, 2022Jun 15, 2022
Day 9: Components with known vulnerabilitiesPlease note: This is part nine of a 10-part series on TryHackMe OWASP top 10 roomJun 14, 2022Jun 14, 2022
Day 8: Insecure deserializationPlease note: This is part eight of a 10-part series on TryHackMe OWASP top 10 roomJun 13, 2022Jun 13, 2022
Day 7: Cross site scripting (XSS)Please note: This is part seven of a 10-part series on TryHackMe OWASP top 10 roomJun 13, 20221Jun 13, 20221
Day 6: Security MisconfigurationPlease note: This is part six of a 10-part series on TryHackMe OWASP top 10 roomJun 13, 2022Jun 13, 2022
Day 5: Broken access controlPlease note: This is part five of a 10-part series on TryHackMe OWASP top 10 roomJun 13, 2022Jun 13, 2022