Shakel Ahmed

Shakel Ahmed

United Kingdom
Shakel Ahmed is a cybersecurity practitioner with 20+ years of experience defending global organizations. As the founder of CyberDesserts, he provides hands-on, practical guidance to help professionals master the skills that actually matter.
02
Dec
ELK Stack logo and its components - Elasticsearch, Logstash and Kibana

What is ELK in Cybersecurity? A Security Professional's Guide

ELK Stack is used by security teams for centralised log management, real-time threat detection, incident response, and compliance logging. This guide covers what it is, whether it qualifies as a SIEM, and when it makes sense to deploy it.
4 min read
02
Dec
Why npm audit fix Isn't Working

Why npm audit fix Isn't Working

You ran npm audit fix and it made no difference. Here is why, and what to do instead. This is
4 min read
30
Nov
Dark code editor displaying JavaScript import statements, representing the npm dependency ecosystem that supply chain attacks target

How Attackers Target npm Maintainer Accounts

April 2026 The registry trusts credentials, not identity. Detection time for npm maintainer account attacks has compressed from months to
19 min read
22
Nov
Cyber Awareness Training: Behavioral Methods That Move Beyond Conventional Approaches

Cyber Awareness Training: Behavioral Methods That Move Beyond Conventional Approaches

Only 32% of employees engage with cybersecurity awareness training (CybSafe 2025), yet 91% of successful cyberattacks still begin with a
4 min read
21
Nov
Geometric wireframe bear overlaid on a cloud icon, representing AzureHound cloud reconnaissance within the BloodHound suite

AzureHound Attacks: How to Detect Cloud Reconnaissance

Updated April 2026 By default, Microsoft Graph activity logs are not enabled (Unit 42). AzureHound reconnaissance by threat actors like
7 min read
14
Nov
Linux for Cybersecurity: The Complete Learning Path

Linux for Cybersecurity: The Complete Learning Path

A systematic path that builds skills progressively getting you comfortable with Linux, each phase preparing you for the next.
5 min read
07
Nov
Build your ultimate hacking playground

How to Build a Cybersecurity Practice Lab in 2026

Updated February 2026: Expanded with cloud lab environments, Docker-based labs, AI-assisted lab building, and GitHub workflows. Original VirtualBox guide updated.
19 min read
07
Nov
NMAP NSE Scripts

Nmap NSE Scripts for Vulnerability Scanning (2026 Guide)

Updated March 2026 The Nmap Scripting Engine (NSE) is a built-in framework that extends Nmap from a port scanner into
14 min read
07
Nov
Network Scanning with Nmap: Essential Guide for Security Professionals

Network Scanning with Nmap: Essential Guide for Security Professionals

Article Content Almost all cybersecurity professionals have familiarity with Nmap and most use it frequently. It's an important
8 min read
03
Nov
AI's Capability And Exponential Growth: 2030 is Closer Than You Think

AI's Capability And Exponential Growth: 2030 is Closer Than You Think

tl;dr - AI capability is doubling every 7 months, this could have massive impact on how we use AI today and into the future.
1 min read