[go: up one dir, main page]

DEV Community

Giorgi Akhobadze profile picture

Giorgi Akhobadze

I have experience in developing control and automation systems, internal corporate systems, creating databases and creating control and monitoring programs.

Building a Modern Network Observability Stack: Combining Prometheus, Grafana, and Loki for Deep Insight

Building a Modern Network Observability Stack: Combining Prometheus, Grafana, and Loki for Deep Insight

Comments
6 min read

Want to connect with Giorgi Akhobadze?

Create an account to connect with Giorgi Akhobadze. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
The Secure Network Automation Playbook: Using Ansible, Python, and GitOps for Security

The Secure Network Automation Playbook: Using Ansible, Python, and GitOps for Security

Comments
6 min read
The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

Comments
7 min read
Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

3
Comments
6 min read
The Psychology of Social Engineering: A Deep Dive into Modern Manipulation Tactics

The Psychology of Social Engineering: A Deep Dive into Modern Manipulation Tactics

Comments
6 min read
The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

The Silent Intruder: Mastering the Art of Lateral Movement and Network Reconnaissance

1
Comments
8 min read
Anatomy of Initial Access: A Deep Dive into the Modern Hacker's First Move

Anatomy of Initial Access: A Deep Dive into the Modern Hacker's First Move

Comments
9 min read
Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Zero Trust in Practice: A Blueprint for Architecting a Truly Defensible Network

Comments
7 min read
The Evolution of Malware: An In-Depth Look at Polymorphic and Metamorphic Threats

The Evolution of Malware: An In-Depth Look at Polymorphic and Metamorphic Threats

Comments
7 min read
Beyond Passwords: A Comprehensive Guide to Modern Multi-Factor Authentication Methods

Beyond Passwords: A Comprehensive Guide to Modern Multi-Factor Authentication Methods

Comments
5 min read
A Complete Guide to Network Forensics: Investigating and Analyzing Network Traffic for Intrusions

A Complete Guide to Network Forensics: Investigating and Analyzing Network Traffic for Intrusions

Comments
6 min read
Wi-Fi Deauthentication attack

Wi-Fi Deauthentication attack

Comments
3 min read
SQL Injection attack

SQL Injection attack

Comments
2 min read
MITM attack

MITM attack

Comments
3 min read
Cloud cyber attacks

Cloud cyber attacks

Comments
2 min read
EXIFViewer

EXIFViewer

Comments
1 min read
Employees Management System (EMS)

Employees Management System (EMS)

1
Comments
4 min read
Password Generator

Password Generator

Comments
1 min read
QR Code Generator

QR Code Generator

Comments
2 min read
SecureText App

SecureText App

Comments
2 min read
SecureFile App

SecureFile App

Comments
2 min read
loading...