top of page


AI in Cybersecurity: How Red and Blue Teams Use Artificial Intelligence to Stay Ahead
Explore how AI empowers both sides of the security equation, the emerging purple team collaborations that unite them, and the governance needed to keep innovation secure.
Nov 84 min read


UNC6395: From GitHub to Salesforce, Inside the Supply‑Chain Breach
A compromise of Salesloft’s GitHub kicked off a supply‑chain campaign that used stolen OAuth tokens from Drift to export data at scale from Salesforce.
Sep 114 min read


APT36 Explained: Transparent Tribe’s Tools, Targets & IOC's
APT36—also known as Transparent Tribe, Mythic Leopard, ProjectM, and Earth Karkaddan—is a Pakistan-based advanced persistent threat (APT) group active since at least 2013.
Sep 64 min read


Threat Intel the easy way with OpenCTI and Docker
How to deploy the OpenCTI (Open Cyber Threat Intelligence) platform within Docker, enabling you to aggregate and analyze threat intelligence in one place.
Aug 264 min read


Level Up Your Phishing Defense: Tools Every Techie Should Know (and Use!) 🛡️
This article breaks down the tools you can use to fight back against phishing emails, from simple checks to more advanced techniques.
Jun 184 min read


Security Onion SIEM Setup
Security Onion SIEM setup guide.
Network security monitoring, intrusion detection, and log management
May 133 min read


Wazuh XDR setup on Proxmox virtual machine
This guide will show you how to setup a Wazuh on a home proxmox server and connect your Windows clients for security monitoring.
Apr 285 min read
bottom of page



