top of page
Articles
Nov 45 min read
Pyramid of Pain - Threat Hunting
The Pyramid of Pain is a model that categorizes different types of IOCs and illustrates the levels of difficulty an attacker faces.
31
Oct 125 min read
What is Secure Access Service Edge (SASE)?
This guide breaks down the components, benefits, challenges, and implementation considerations for SASE.
21
Sep 75 min read
Cyber Threat Actors: The Hackers Behind Global Attacks
Examine the key cyber threat actors, their motivations, techniques, and the global impact of their activities.
26
Aug 75 min read
Social Media misinformaton via bots and fake accounts
How actors use fake accounts and bots to spread misinformation and best methods to prevent these threats.
213
Jul 314 min read
Understanding DDoS Attacks: Methods, Tools, and Defense Strategies
Delve into how DDoS attacks are executed, tools hackers utilize, and the defensive measures companies can adopt to mitigate these threats.
32
Jun 234 min read
FTP and SSH Pentesting
This guide will show you how to test your network for FTP and SSH vulnerabilities and use these findings to secure it.
198
Jun 94 min read
Security Analyst Tools
A Security Operations Center (SOC) analyst uses a variety of tools to monitor, detect, analyze, and respond to cybersecurity threats.
124
May 162 min read
Essential Windows Commands
Essential Windows commands every techy should know about!
40
May 133 min read
Security Onion SIEM Setup
Security Onion SIEM setup guide.
Network security monitoring, intrusion detection, and log management
682
bottom of page