Posts

Reviewing research papers for Vigenère and Playfair ciphers

Vigenère Cipher Paper Review The article Message Security in Classical Cryptography Using the Vigenere Cipher Method , published in the International Journal Software Engineering and Computer Science (IJSECS) by Lembaga KITA in April 2024, examines the Vigenère cipher, a classical polyalphabetic substitution technique introduced by Blaise de Vigenère. The paper explains how the cipher works by using a repeating key to obscure letter frequency patterns, making it more secure than monoalphabetic substitution ciphers. The authors also discuss the historical significance of the Vigenère cipher and its role in classical cryptography, while connecting it to modern discussions about message confidentiality. I found this article to be fairly thorough in covering the historical background and fundamental mechanics of the Vigenère cipher. The explanations are clear and easy to follow, especially in showing how the cipher improves upon simpler substitution methods. The inclusion of both streng...

A Small Blog of Resources for Computer Cybersecurity Professionals (Social Engineering and Ethical Hacking)

Introduction Cybersecurity professionals must understand both human and technical aspects of security. Two of the most important concepts in this field are social engineering and ethical hacking. These concepts help security professionals identify weaknesses, protect systems and educate users about threats in the real world. Social Engineering Social engineering is a technique used by attackers to manipulate people into revealing confidential information or performing actions that compromise security. Instead of attacking systems directly, social engineers exploit human behavior such as trust, fear, curiosity or urgency. This makes social engineering especially dangerous because even the most secure systems can be compromised if users are deceived. A common example of social engineering is phishing. In a phishing attack, an attacker sends an email that appears to come from a trusted organization, such as a bank or employer, asking the user to click a link or provide login credential...

Reverse Engineering Malware: A Deep Dive

Introduction Reverse engineering malware is a critical skill for security researchers, threat analysts, and incident responders. By dissecting malicious software, we can uncover its true capabilities, identify vulnerabilities, and develop more effective countermeasures. In this post, we will conduct a deep analysis of a real-world malware sample using Ghidra, an open-source reverse engineering tool widely used by professionals in the field. Selecting the Malware Sample For this analysis, we have chosen Agent Tesla, a well-known keylogger and Remote Access Trojan (RAT) that has been actively used in cyber espionage campaigns. Typically delivered through phishing emails, Agent Tesla has targeted businesses and individuals alike, often masquerading as legitimate software attachments to evade detection. Our goal is to reverse engineer this sample to understand its inner workings and identify potential indicators of compromise (IoCs). Setting Up the Analysis Environment Before analyzing the...

Why Cybersecurity Matters More Than Ever in 2025

The world has always been a connected place, but in 2025, that connection comes with a new layer of vulnerability. Cyberattacks are no longer just technical nuisances—they’re global threats, often targeting the very fabric of our daily lives. This year has been a turning point, with AI-driven attacks and ransomware tactics reshaping how we think about cybersecurity. Let’s explore why protecting our digital spaces has become more critical than ever. AI-Powered Threats: The Cyber Criminal’s New Best Friend Artificial Intelligence has brought incredible advancements to our lives, but unfortunately, it’s also being weaponized by attackers. Picture this: you receive a call from someone who sounds exactly like your boss, urgently asking you to transfer funds. It seems legitimate, but it’s a scam. In 2023, scammers used AI-generated voices to trick employees into transferring money, showing how dangerous this technology can be in the wrong hands. Source: https://www.wsj.com/articles/hotels-an...

First post! - Introduction to SecSecGo!

Welcome to SecSecGo! – A Cybersecurity Adventure Begins Greetings, fellow tech enthusiasts and security warriors! 👋 Welcome to SecSecGo! , a blog dedicated to exploring the fascinating and fast-paced world of cybersecurity. Whether you’re a seasoned pro, a curious newcomer, or someone who loves a good challenge, you’ll find something here to pique your interest. What You Can Expect Hot Topics: Dive into the latest trends, vulnerabilities, and attacks shaking up the cybersecurity industry. Technical Deep Dives: Learn through hands-on Proof of Concepts (PoCs) that break down how exploits work, step by step. Tips and Tools: Discover practical advice and tools to level up your security game. Industry Insights: Stay ahead with discussions about the future of cybersecurity, from AI defenses to IoT challenges. First Topic Teaser: Why Cybersecurity Matters More Than Ever in 2025 In our next post, we’ll explore how the rise of AI-driven attacks and evolving ransomware tactics have redefine...