WhatsApp Web Phishing Scam Exposed
Recently I came across a phishing page that simulated Whatsapp Web login workflow. It was really a clear clone – the QR code changed every 20 seconds and if I were in China I would have definitely needed to look at the URL carefully. What is Whatsapp Web? WhatsApp Web is essentially a web-based interface …
Decoding Cybersecurity Roles: Analyst vs. Engineer vs. Researcher
Navigating the complex world of cybersecurity can be a daunting task, especially when it comes to understanding the different roles and their responsibilities. In this landscape, Security Analysts, Security Engineers, and Security Researchers are the front-runners, each contributing in a unique way. Let’s delve into these roles and break down their distinct key skills in …
Decoding Cybersecurity Roles: Analyst vs. Engineer vs. Researcher Read More »
How to Perform Forensic Investigation on an AWS Instance without a Public Key
Introduction Performing a forensic investigation on an AWS EC2 instance can become complicated if access to the instance is lost or the SSH key is unavailable. Recently, I came upon a case where I did not have the private key to the instance. The only details I had, were the AWS portal login and password. …
How to Perform Forensic Investigation on an AWS Instance without a Public Key Read More »