Nov 45 min readBluePyramid of Pain - Threat HuntingThe Pyramid of Pain is a model that categorizes different types of IOCs and illustrates the levels of difficulty an attacker faces.
Oct 125 min readWeb SecurityWhat is Secure Access Service Edge (SASE)?This guide breaks down the components, benefits, challenges, and implementation considerations for SASE.
Sep 75 min readHackersCyber Threat Actors: The Hackers Behind Global AttacksExamine the key cyber threat actors, their motivations, techniques, and the global impact of their activities.
Aug 75 min readSocial MediaSocial Media misinformaton via bots and fake accountsHow actors use fake accounts and bots to spread misinformation and best methods to prevent these threats.
Jul 314 min readWeb SecurityUnderstanding DDoS Attacks: Methods, Tools, and Defense StrategiesDelve into how DDoS attacks are executed, tools hackers utilize, and the defensive measures companies can adopt to mitigate these threats.
Jun 234 min readWeb SecurityFTP and SSH PentestingThis guide will show you how to test your network for FTP and SSH vulnerabilities and use these findings to secure it.
Jun 94 min readWeb SecuritySecurity Analyst ToolsA Security Operations Center (SOC) analyst uses a variety of tools to monitor, detect, analyze, and respond to cybersecurity threats.
May 162 min readCommandsEssential Windows CommandsEssential Windows commands every techy should know about!
May 133 min readSIEMSecurity Onion SIEM SetupSecurity Onion SIEM setup guide. Network security monitoring, intrusion detection, and log management