Experienced Information Technologist with a strong foundation in cybersecurity. Skilled in HTML, PHP, Python, and managing complex IT environments, with hands-on experience in resolving hardware and software issues, as well as designing secure web solutions. Proven ability to manage network security and implement firewalls and virus protection, with exposure to Splunk SIEM and malware analysis. Adept at delivering technical support and training, and committed to leveraging cybersecurity skills to drive organizational success.
Google on Monday revealed that almost 200,000 app submissions to its Play Store ...
A previously undocumented cyber threat dubbed Muddling Meerkat has been observed...
It comes as no surprise that today's cyber threats are orders of magnitude more ...
A security vulnerability has been discovered in the R programming language that ...
Multiple critical security flaws have been disclosed in the Judge0 open-source o...
Identity and access management (IAM) services provider Okta has warned of a spik...
Cybersecurity researchers have discovered a targeted operation against Ukraine t...
Select Ukrainian government networks have remained infected with a malware calle...
Threat actors behind the Akira ransomware group have extorted approximately $42 ...
Government entities in the Middle East have been targeted as part of a previousl...
Attackers are increasingly making use of “networkless” attack techniques targeti...
Technology, research, and government sectors in the Asia-Pacific region have bee...
Users of the CrushFTP enterprise file transfer software are being urged to updat...
Palo Alto Networks has shared more details of a critical security flaw impacting...
CISA has issued a new emergency directive ordering U.S. federal agencies to addr...
The Iranian threat actor known as MuddyWater has been attributed to a new comman...