MehrnoushUnderstanding PQC Families Challenges for Blind SignaturesPost-quantum cryptography (PQC) is reshaping secure digital signatures, but not all PQC algorithms are suited for specialized applications…Jul 6, 2025Jul 6, 2025
MehrnoushPreparing Networks for the Quantum Era with QuantaSeek PQC TLS ScannerAs quantum computing looms on the horizon, the security of our digital infrastructure is at a crossroads. In my previous blog post…Jun 26, 2025Jun 26, 2025
MehrnoushFrom Smart Devices to Intelligent Systems: Rethinking Cybersecurity in a Connected WorldAs technology advances, the landscape is shifting from “smart” devices toward deeply intelligent systems. Breakthroughs such as Large…Jan 17, 2025Jan 17, 2025
MehrnoushPreparing for the Post-Quantum Era: Insights and StrategiesImagine a future where sensitive information — banking details, medical records, and even government secrets — could be exposed by quantum…Nov 19, 2024Nov 19, 2024
MehrnoushBlackSuit Ransomware Detection and Mitigation: Leveraging Microsoft Sentinel AnalyticsIn today’s rapidly evolving cybersecurity landscape, organizations face an ever-growing array of threats that require timely and effective…Sep 3, 2024Sep 3, 2024
MehrnoushNavigating the /sys Directory: A Linux Forensic Investigator’s GuideThe /sys directory in Linux is not just a pseudo-filesystem; it serves as a crucial interface between the kernel and user space, offering a…Aug 19, 2024Aug 19, 2024
MehrnoushLeveraging the /proc Filesystem for Linux Live Forensics: A Comprehensive GuideThe /proc filesystem in Linux is an essential artifact for forensic analysts. As a virtual filesystem, it provides an interface to the…Aug 19, 2024Aug 19, 2024
MehrnoushMaster CORS Security: Develop Your Code to Detect MisconfigurationsCross-Origin Resource Sharing (CORS) is a mechanism that allows a web server to specify who can access its resources and how those…May 25, 2024May 25, 2024
MehrnoushUnderstanding Shellcode Injection in a Local ProcessWhen it comes to the field of cybersecurity, having a solid grasp of the different methods of shellcode injection is crucial for both…Apr 27, 2024Apr 27, 2024