Zero-Day Cyber Security
/News /Labs /Blogs /
Home labs 2
Text Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce a varius ligula, eget tincidunt est. Vivamus vel malesuada sapien. Nunc imperdiet nisi nec fringilla pretium. Duis consectetur, ante non consequat vestibulum, purus nisl volutpat nisl, faucibus molestie elit nulla in ex. Praesent vestibulum quam nec est commodo interdum. Morbi euismod nibh sit amet […]
Home labs
Text Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce a varius ligula, eget tincidunt est. Vivamus vel malesuada sapien. Nunc imperdiet nisi nec fringilla pretium. Duis consectetur, ante non consequat vestibulum, purus nisl volutpat nisl, faucibus molestie elit nulla in ex. Praesent vestibulum quam nec est commodo interdum. Morbi euismod nibh sit amet […]
Lab walkthrough Copy
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer vitae iaculis ipsum. Sed auctor libero ac odio placerat ultricies eu eu libero. Mauris vitae lacus eget justo ornare fermentum sit amet vitae eros. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Curabitur nec dolor non nunc iaculis porta. Vivamus […]
Lab walkthrough
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer vitae iaculis ipsum. Sed auctor libero ac odio placerat ultricies eu eu libero. Mauris vitae lacus eget justo ornare fermentum sit amet vitae eros. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Curabitur nec dolor non nunc iaculis porta. Vivamus […]
Blue Team vs Red Team
In the realm of cyber security, the concepts of Blue Team and Red Team exercises play a vital role in strengthening an organisation’s defences against modern threats. These two teams represent opposing forces in a simulated attack scenario, designed to uncover vulnerabilities, improve incident response, and enhance overall security posture. The Red Team is […]
Persistence of Registry Keys in Windows
In the realm of Windows operating systems, the registry is a central hierarchical database that stores configuration settings and options for the system, applications, and user profiles. Among its many functions, the registry is a prime target for establishing persistence mechanisms, especially in the context of malware and system administration scripts. in […]
About me,
I am a passionate cyber security enthusiast dedicated to exploring the latest trends, threats, and innovations in the digital world. My blog focuses on delivering insightful news, hands-on labs, and practical tips to help readers understand and tackle modern security challenges. With a keen interest in ethical hacking, network defence, and emerging technologies, I strive to make complex topics accessible to professionals and learners alike. Through my posts, I aim to foster awareness, encourage best practices, and inspire curiosity in the ever-evolving cyber landscape. This space is my platform to share knowledge, experiments, and updates to strengthen digital resilience.