Kevin Pagano is a seasoned cybersecurity professional specializing in Digital Forensics and Incident Response. With a strong technical background and a passion for unravelling complex cyber incidents, Kevin has become a trusted expert in investigating and mitigating cyber threats. When i first started getting into DFIR and was searching for all blogs and tools to…
Tag: Interview
Black Hat Python by Justin Seitz and Tim Arnold (REVIEW)
If you’re diving into the world of ethical hacking and penetration testing, “Black Hat Python: Python Programming for Hackers and Pentesters” by Justin Seitz and Tim Arnold is an essential read. Published by No Starch Press, this book is a treasure trove of practical knowledge and hands-on techniques that cater to both budding and seasoned…
Interview with Hacker, Programmer and Former Armoured Recon Patrol Commander Leigh Trinity
Today, I have the privilege of sitting down with a remarkable individual who I have been friends with for a while now, a former armored recon patrol commander, she has traded the battlefield for the digital frontier, wielding her skills in C# and Python to fortify systems against potential threats. But that’s not all—beyond the…
Interview with DFIR Legend Alexis Brignoni
For this interview I have had the please to speak with someone who is so prevalent in DFIR, is very highly thought of and is a pleasure to have got the chance to chat. I have been trying to learn Python for what seems like forever, and it was where I first spent any kind…
Interview with Security Researcher, Speaker Will Thomas (@BushidoToken)
Welcome back to another interview and thanks as always for popping in. I had the chance to speak to someone I really like and rate highly and is one of the really good guys, I am lucky to interview loads of great people and have yet to come across anyone that I haven’t really got…
Week Eight of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training
Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Week Three Week Four Week Five Week Six Week Seven So, moving onto module 6. Introduction to Network Security Incident Common Network Security Incidents Need for Network Security Incident Handling and Response Preparation for Handling Network Security Incidents Preparation…
Interview with Teacher, Ethical Hacker, Compute Scientist, and founder/CEO of zSecurity Zaid Sabih
Hello and welcome back, This post I have an interview with Zaid Sabih, you will have most definitely seen him around in the cybersecurity world whether from his courses on StationX, Udemy, Zaid website, zSecurity website, YouTube or through his company zSecurity that provides so many services from Penetration Testing, Hardware Tools in the store…
Week Three of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training.
Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Since the last post I have worked through the two lab exercises for module 1 which are these:- Qualitative Risk Assessment Using PILAR Risk Management Tool This lab demonstrates how to perform a Qualitative Risk Assessment using PILAR Risk…
Interview with Reformed Convicted Black Hat Hacker Daniel Kelley of the big Talk Talk Hack of 2015
In this article I get to interview a former black hat hacker Daniel Kelley who is mostly known for the Talk Talk hack of 2015 which allegedly was a £77 million hack. What first got me was having spoken to Daniel is that he is NOTHING like what you think he is going to be…
Week Two of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training.
Hello, Welcome to week two of doing my ECIH self-study training, I am calling it week two but really its 2 and 3. The main thing I have learnt this week or so is that the course is nowhere near as easy as I thought it was going to be, this is a good thing…