Sunday, December 31, 2023


 he Mirai virus was a malicious piece of software that was first discovered in 2016. It was designed to target Internet of Things (IoT) devices, such as routers, smart cameras, and smart thermostats, and was able to compromise these devices by exploiting vulnerabilities in their software. Once it had infected a device, Mirai would use it to participate in distributed denial of service (DDoS) attacks.

The damage caused by Mirai was significant. For instance, Mirai’s first large-scale attack was in September 2016 against a French technology company, OVH. Mirai’s attack peaked at an unprecedented 1Tbps and is estimated to have used about 145,000 devices within the assault. (source:

Mirai virus is an example of one of the cybersecurity laws-"With Innovation Comes Opportunity For Exploitation" that Nick Espionosa talks about in his TED talk-"The five laws of cybersecurity".

One thing that stood out to me in this TED Talk was the idea that there is a lack of a shared understanding of cybersecurity within internet culture. Nick argues that with over 3.6 billion people online and communicating with each other and institutions every day, there is a common language that we all share through networking protocols and social media platforms. However, the topic of cybersecurity is not as widely understood as it should be. In his TED Talk, Nick tries to bridge this gap by introducing his five laws. This talk highlights the importance of increasing awareness and education about cybersecurity in order to better protect ourselves and our communities online.

Do catch the summary of these laws in my sketchnote and watch the TED talk (~7 min)- hashtagcyberawareness hashtagcybersecurity

LinkedIn post:


 The recently concluded FIFA World Cup had almost everyone completely mesmerized. In the semi-finals, the eventual champions- Argentina beat Croatia 3-0. What was distinct about this match was that all three goals were scored via unique attacking mechanisms. The first one was via a penalty kick. The second one was via a high quality dribbling play all the way from midfield. The third one was an exceptional display of ball handling skills near the opponent's goal.

Like in soccer, in cybersecurity too, an attacker applies a range of approaches to outmaneuver the organization's defense, exploit vulnerabilities, evade detection, and access sensitive information.

If you have to stay ahead of the attackers, you need to build mechanisms to get insights into adversary attack behaviors and how specific attacks are orchestrated. This allows you to better respond to, and mitigate, current and future threats.

This is exactly how tactics, techniques, and procedures (TTPs) helps the cyber security teams.