Let's Simplify...

My take on the Threat Research

Published on
2 min read
Let's Simplify...

Table of Contents

Introduction

Since my childhood, I was fascinated by various digital products but mostly computer games/video games. When I got stuck into some level in any game, I used to search online about other players' gameplay and then understood their mindset/approach to pass that level. When I grew up and start studying more about technology and here I stick to the same thing I read and learn about my peers' mindsets or approaches to solving any problem. This technique helps me personally before I start to solve any problem whether it is in my personal or professional life. 

What

I am going to log my progress in my understanding of the various threat research techniques, technologies and everything in between through this blog

Why

It always interests me to see how a tiny misconfiguration or error on the part of a developer may have terrible effects on any organization or how a technology flaw can be exploited by hackers to create money-making machines. However, developers are proactive in fixing these flaws and errors, and they also include defense strategies to render these systems impenetrable to hackers (or are they? ), which explains the cat-and-mouse game that goes on in the cybersecurity field. In such situations, I am always eager to comprehend the adversaries' point of view, mindset, or methods for spotting minute flaws or setup mistakes in any system and then taking advantage of them to further their objectives. I, therefore, defended my career as a threat researcher.

Parallelly, I am working on curating a list of a handful of resources that will help any threat researcher with the starting point, I named it as ThreatBook

 

 

Discussion (0)

Subscribe