Mohd Kashif
About Me CV Blogs Projects Publications

    Advent of Cyber 2025 | Challenge 3: Splunk Basics – Did You SIEM?

    splunk siem log analysis soc

    Lessons learned from Advent of Cyber 2025 Splunk log analysis challenge. This blog is mainly about diving deep into web and firewall logs, identify important fields and anomaly detection

    03 December 2025

    Advent of Cyber 2025 | Challenge 1: Linux CLI Shell Bells

    shell linux

    Lessons Learned from AOC 2025 Challenge 1

    01 December 2025

    Adversary-in-the-Middle (AiTM)

    Cybersecurity cloud security identity microsoft defender threat detection

    Why MFA success does not always mean secure login – detecting AiTM attacks with Microsoft Defender

    20 November 2025

    Malware Alert

    Cybersecurity Malware YARA LOKI

    Discussing steps after malware detection and utilising tools like YARA and LOKI.

    01 May 2025

    Business Email Compromise: Emotet

    Cybersecurity BEC Emotet

    Discussing Emotet, Initially designed as a banking trojen, this malware is now being used as a landing platform for other malware.

    20 April 2025

    Threat Intelligence: Abuse.ch

    Threat Intelligence Cybersecurity Abuse.ch

    Introduction to the Abuse.ch for Threat Intelligence

    10 April 2025

    SIGMA Rules

    SIGMA Cybersecurity Bloodhound

    Introduction to the SIGMA Rules

    01 April 2025

    Top 5 Techniques of Hackers

    Threat hunting Cybersecurity

    Discussing the top 5 tools used by hackers

    20 March 2025

    Top 5 Threats in Cybersecurity

    Threat hunting Cybersecurity

    Discussing the top 5 tools used by hackers

    10 March 2025

    Top trends shaping Threat models today

    Threat hunting Cybersecurity

    Hunting for threats in logs is a time consuming task. Where to start threat detection?

    25 February 2025
    Mohd Kashif 2026