top of page


KQL in SecOps (3) – Aggregation & Summarization
Detect patterns over time, Identify anomalies and outliers, Build actionable alerts, Generate SOC metrics for dashboards
2 days ago4 min read


KQL in SecOps (1) - Why Every Security Analyst Must Learn KQL
What KQL is, Why it is critical for SOCs, How analysts use it daily, Common misconceptions and best practices.
Dec 22, 20256 min read


AI and Cybersecurity: Transforming the Landscape in 2026
Explore how AI empowers both sides of the security equation, the emerging purple team collaborations that unite them, and the governance needed to keep innovation secure.
Nov 8, 20254 min read


Mastering KQL: The Key to Enhancing Cybersecurity with Microsoft Sentinel
Delve into what KQL is, how it powers Microsoft Sentinel, and how cyber defenders can harness it to strengthen security postures with practical query example.
Jul 23, 20254 min read


Level Up Your Phishing Defense: Tools Every Techie Should Know (and Use!) 🛡️
This article breaks down the tools you can use to fight back against phishing emails, from simple checks to more advanced techniques.
Jun 18, 20254 min read


Using PowerShell for Security Investigations
This guide outlines how to use PowerShell effectively for blue team security testing.
Mar 12, 20254 min read


Wazuh SIEM & XDR setup on Azure Linux virtual machine
This guide will show you how to setup a Wazuh server in Azure and connect your Windows clients for security monitoring within the Azure host
Jan 8, 20255 min read


Pyramid of Pain - Threat Hunting
The Pyramid of Pain is a model that categorizes different types of IOCs and illustrates the levels of difficulty an attacker faces.
Nov 4, 20245 min read


Security Analyst Tools
A Security Operations Center (SOC) analyst uses a variety of tools to monitor, detect, analyze, and respond to cybersecurity threats.
Jun 9, 20244 min read
bottom of page



