PinnedSuricata and Wazuh Setup and Integration: Step-by-Step GuideSuricata is a powerful open-source threat detection engine capable of real-time intrusion detection (IDS), inline intrusion prevention…Sep 1, 2024Sep 1, 2024
Behaviors of an Adversary: Strengthening Cybersecurity DefensesUnderstanding the various strategies and tactics employed by adversaries is crucial in fortifying the detection capabilities of security…Dec 28, 2023Dec 28, 2023
ransomwareOne of the biggest cybersecurity problems today, this malware encrypts an organization’s (or individual’s) critical files and documents and…Oct 12, 2023Oct 12, 2023
SOC Analysts guide to Phishing triagePhishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers…Nov 7, 2022Nov 7, 2022
Tips for Blue Team [Cyber Security]Cybersecurity team conversations these days can feel like a rainbow, with mentions of red, blue and even purple teams. While each team has…Oct 4, 2022Oct 4, 2022
Kyocera Printers ExploitThis was a pen test scenario where a printer feature we abused to get domain credentials.Oct 4, 2022Oct 4, 2022
5 Chrome extensions for every IT professionalThis article will introduce five efficient and beneficial Google Chrome extensions that IT professionals should have.Sep 28, 2022Sep 28, 2022