S4VVYSPL01TBehaviors of an Adversary: Strengthening Cybersecurity DefensesUnderstanding the various strategies and tactics employed by adversaries is crucial in fortifying the detection capabilities of security…4 min read·Dec 28, 2023----
S4VVYSPL01TransomwareOne of the biggest cybersecurity problems today, this malware encrypts an organization’s (or individual’s) critical files and documents and…3 min read·Oct 12, 2023----
S4VVYSPL01TSOC Analysts guide to Phishing triagePhishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers…3 min read·Nov 7, 2022----
S4VVYSPL01TTips for Blue Team [Cyber Security]Cybersecurity team conversations these days can feel like a rainbow, with mentions of red, blue and even purple teams. While each team has…2 min read·Oct 4, 2022----
S4VVYSPL01TKyocera Printers ExploitThis was a pen test scenario where a printer feature we abused to get domain credentials.2 min read·Oct 4, 2022----
S4VVYSPL01T5 Chrome extensions for every IT professionalThis article will introduce five efficient and beneficial Google Chrome extensions that IT professionals should have.1 min read·Sep 28, 2022----