top of page



Mastering KQL: The Key to Enhancing Cybersecurity with Microsoft Sentinel
Delve into what KQL is, how it powers Microsoft Sentinel, and how cyber defenders can harness it to strengthen security postures with practical query example.
Jul 234 min read


Level Up Your Phishing Defense: Tools Every Techie Should Know (and Use!) 🛡️
This article breaks down the tools you can use to fight back against phishing emails, from simple checks to more advanced techniques.
Jun 194 min read


Using PowerShell for Security Investigations
This guide outlines how to use PowerShell effectively for blue team security testing.
Mar 124 min read


Wazuh SIEM & XDR setup on Azure Linux virtual machine
This guide will show you how to setup a Wazuh server in Azure and connect your Windows clients for security monitoring within the Azure host
Jan 85 min read


Pyramid of Pain - Threat Hunting
The Pyramid of Pain is a model that categorizes different types of IOCs and illustrates the levels of difficulty an attacker faces.
Nov 4, 20245 min read


Security Analyst Tools
A Security Operations Center (SOC) analyst uses a variety of tools to monitor, detect, analyze, and respond to cybersecurity threats.
Jun 9, 20244 min read
bottom of page