top of page


The Ultimate Guide to Staying Safe Online: Tools, Habits, and Smart Practices
This post explores the key categories of protection—VPNs, password managers, EDR solutions, SIEM systems, and security awareness training—and highlights three recommended tools or services in each category.
6 days ago6 min read


Scattered Spider / UNC3944: Inside the Identity-Centric Cybercrime Threat
Scattered Spider (UNC3944) is a loosely affiliated but highly skilled cybercrime group first observed around May 2022. Known for their adaptability, they operate under multiple aliases including Octo Tempest, Muddled Libra, and 0ktapus.
At first, they specialized in SIM swapping and credential theft.
7 days ago4 min read


UNC6395: From GitHub to Salesforce, Inside the Supply‑Chain Breach
A compromise of Salesloft’s GitHub kicked off a supply‑chain campaign that used stolen OAuth tokens from Drift to export data at scale from Salesforce.
Sep 114 min read


APT36 Explained: Transparent Tribe’s Tools, Targets & IOC's
APT36—also known as Transparent Tribe, Mythic Leopard, ProjectM, and Earth Karkaddan—is a Pakistan-based advanced persistent threat (APT) group active since at least 2013.
Sep 64 min read


Threat Intel the easy way with OpenCTI and Docker
How to deploy the OpenCTI (Open Cyber Threat Intelligence) platform within Docker, enabling you to aggregate and analyze threat intelligence in one place.
Aug 264 min read


Stay Safe: Understanding the WinRAR Vulnerability (CVE-2025-8088)
This flaw impacts WinRAR versions prior to 7.13 and leverages a directory traversal bug to allow attackers to drop and execute malicious code on a target system without the victim’s knowledge.
Aug 113 min read


Mastering KQL: The Key to Enhancing Cybersecurity with Microsoft Sentinel
Delve into what KQL is, how it powers Microsoft Sentinel, and how cyber defenders can harness it to strengthen security postures with practical query example.
Jul 234 min read


Level Up Your Phishing Defense: Tools Every Techie Should Know (and Use!) 🛡️
This article breaks down the tools you can use to fight back against phishing emails, from simple checks to more advanced techniques.
Jun 194 min read


Infostealer Malware Explained: How It Works, Real-World Examples, and How to Stay Safe
Discover what infostealer malware is, how it operates, real-life examples like RedLine, Vidar, and Raccoon Stealer, and learn effective cybersecurity measures to protect your sensitive data.
May 284 min read
bottom of page