top of page
Articles
![Wazuh SIEM & XDR setup on Azure Linux virtual machine](https://static.wixstatic.com/media/5b813d_42ef9c9830fd43f49703b5fb5401f640~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_42ef9c9830fd43f49703b5fb5401f640~mv2.webp)
Jan 85 min read
Wazuh SIEM & XDR setup on Azure Linux virtual machine
This guide will show you how to setup a Wazuh server in Azure and connect your Windows clients for security monitoring within the Azure host
320
![Introduction to the NIST cybersecurity framework (CSF)](https://static.wixstatic.com/media/5b813d_7163a2a0c3a3424aaa509d9e9641bf6c~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_7163a2a0c3a3424aaa509d9e9641bf6c~mv2.webp)
Dec 29, 20245 min read
Introduction to the NIST cybersecurity framework (CSF)
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a widely adopted set of guidelines designed to...
37
![ZIP File password cracking](https://static.wixstatic.com/media/5b813d_f419297e9b5740acb46ed4847b2a1786~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_f419297e9b5740acb46ed4847b2a1786~mv2.webp)
Dec 23, 20245 min read
ZIP File password cracking
Learn how to recover forgotten ZIP file passwords with fcrackzip. This guide covers installation, syntax, and best practices.
25
![](https://static.wixstatic.com/media/5b813d_9a3a9f5dca4e448aa068d1cc97c2f8f1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5b813d_9a3a9f5dca4e448aa068d1cc97c2f8f1~mv2.webp)
![Pyramid of Pain - Threat Hunting](https://static.wixstatic.com/media/5b813d_9a3a9f5dca4e448aa068d1cc97c2f8f1~mv2.jpg/v1/fill/w_292,h_219,fp_0.50_0.50,q_90,enc_auto/5b813d_9a3a9f5dca4e448aa068d1cc97c2f8f1~mv2.webp)
Nov 4, 20245 min read
Pyramid of Pain - Threat Hunting
The Pyramid of Pain is a model that categorizes different types of IOCs and illustrates the levels of difficulty an attacker faces.
43
![What is Secure Access Service Edge (SASE)?](https://static.wixstatic.com/media/5b813d_823858e6cbf844cd986c78fbff5ff94f~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_823858e6cbf844cd986c78fbff5ff94f~mv2.webp)
Oct 12, 20245 min read
What is Secure Access Service Edge (SASE)?
This guide breaks down the components, benefits, challenges, and implementation considerations for SASE.
33
![](https://static.wixstatic.com/media/5b813d_b83bd704cdc04d0e9a27f896bba3f758~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5b813d_b83bd704cdc04d0e9a27f896bba3f758~mv2.webp)
![Pentesting: Essential Techniques for Effective Security Testing](https://static.wixstatic.com/media/5b813d_b83bd704cdc04d0e9a27f896bba3f758~mv2.jpg/v1/fill/w_292,h_219,fp_0.50_0.50,q_90,enc_auto/5b813d_b83bd704cdc04d0e9a27f896bba3f758~mv2.webp)
Oct 1, 20244 min read
Pentesting: Essential Techniques for Effective Security Testing
A comprehensive overview of pentesting, its phases, and commonly used tools to help you get started.
58
![Cyber Threat Actors: The Hackers Behind Global Attacks](https://static.wixstatic.com/media/5b813d_4c2f10d9171c424a9194a2ac3ca74340~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_4c2f10d9171c424a9194a2ac3ca74340~mv2.webp)
Sep 7, 20245 min read
Cyber Threat Actors: The Hackers Behind Global Attacks
Examine the key cyber threat actors, their motivations, techniques, and the global impact of their activities.
40
![](https://static.wixstatic.com/media/5b813d_bf156275bdad466b8d8e451100c561a6~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5b813d_bf156275bdad466b8d8e451100c561a6~mv2.webp)
![Phishing: Prevention, Detection, and Recovery](https://static.wixstatic.com/media/5b813d_bf156275bdad466b8d8e451100c561a6~mv2.jpg/v1/fill/w_292,h_219,fp_0.50_0.50,q_90,enc_auto/5b813d_bf156275bdad466b8d8e451100c561a6~mv2.webp)
Aug 10, 20244 min read
Phishing: Prevention, Detection, and Recovery
An in-depth look at phishing, including prevention methods, detection techniques, and recovery steps in case of a compromise.
105
![Social Media misinformaton via bots and fake accounts](https://static.wixstatic.com/media/5b813d_dfdf25821bb04feb9185fdb6cae46cda~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/5b813d_dfdf25821bb04feb9185fdb6cae46cda~mv2.webp)
Aug 7, 20245 min read
Social Media misinformaton via bots and fake accounts
How actors use fake accounts and bots to spread misinformation and best methods to prevent these threats.
223
bottom of page