Hands-on Tutorials

Can the 170k #gamestop tweets from Jan 25th-29th gives us an insight into the ensuing market chaos?

The ensuing impact of Elon Musk’s now famous ‘Gamestonk!!’ tweet over time | Skanda Vivek

On Jan 26th at 4:08 PM EST, Elon Musk tweeted “Gamestonk!!” in reference to the “wallstreetbets” Reddit page, which now has over 9 million subscribers. Interestingly, this was just a few minutes after the stock market closed, one has to wonder if Musk timed this. The following day, Gamestop stock…


Putting the ‘P’ in ‘APT’

Persistence by Nick Youngson CC BY-SA 3.0 Pix4free.org

You might have heard of the term “Advanced Persistent Threat,” or APT in relation to recent large-scale cyber intrusion campaigns. Typically, APTs are nation states or other threat actors that gain unauthorized access to sensitive computer networks, and remain undetected for extended periods of time, and at the same time…


If you can’t measure it, you can’t stop it

Risk Management

In June of 2017, a global cyberattack resulted in a estimated $10 billion loss, much of this from major global businesses. Attributed to Russia, this cyber-attack (known as NotPetya) was a result Windows machines that had not installed recent updates among other issues.

Earlier that year, the National Security Agency…


With natural disasters increasing in magnitude and frequency, how can big data improve resilience?

Hurricane Ida

The history of weather forecasting dates back to the history of humanity itself. For millennia, people have tried to forecast the weather. Jesus himself says in the New Testament:

“When evening comes, you say, ‘It will be fair weather, for the sky is red’, and in the morning, ‘Today it…


Part 1 was finding vulnerabilities (reconnaissance), part 2 is getting your foot in the door

https://www.pikist.com/free-photo-slbef

In the previous article on reconnaissance, I talked about how hackers survey their targets to figure out vulnerabilities.

Here, I will discuss once they know of potential vulnerabilities, how do they gain access to the target’s network? This part in of itself, is composed of detailed tasks.

Acquiring Infrastructures

First, what infrastructures…


You might be an expert at learning new skills. But how do you learn to hack real-world vulnerabilities without landing in trouble?

Photo by Christina Morillo from Pexels

There are 3 reasons why I think learning how to hack is an important skill:

1. Explosive growth in connected systems and vulnerabilities

It’s no surprise that the pace of data generation continues to accelerate — it is estimated that in the financial services sector alone, the data generated per second will grow over 700% in 2021. But…


The chance to fulfill a large unmet need in data based storytelling, and grow as a writer

Person Writing On A Notebook Beside Macbook

We have noticed a lack of publications with in depth analyses on societal issues backed by data. On the one hand, there are multiple publications for sharing code and theory related to data. …


All the fundamentals — How the Internet works, networks, file sharing protocols, and more on TryHackMe

TryHackMe user profile | Skanda

Over the past week, I’ve been hacking away on tryhackme.com. With over half a million users, TryHackMe was founded by 2 cybersecurity students Ashu and Ben at a summer internship.

“(We) found learning security to be a fragmented, inaccessible and difficult experience”

They had a brilliant idea — Sam created…


Fake domains, millions of insecure devices, and public websites like Twitter and GitHub

You might have heard that every device that connects to the Internet has a unique public IP address. Does that mean that your device can figure out where information over the Internet is coming from? If this were true, you wouldn’t have to worry about hackers exploiting the Internet, but…


The first in a series on breaking down complex cyber-attacks into their basic elements, through examples

You might have heard of recent cyber-attacks that are getting increasingly sophisticated. However, just like any other complex topic, cyber-attacks can be understood from first principles, by anyone who is motivated. This series aims to break down cyber-attacks into their basic components, for anyone who understands English, is able to…

Skanda Vivek

Scientist at the interface of data science, cybersecurity, and society. For data based perspectives on societal issues → https://skandavivek.substack.com/

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store