top of page


KQL in SecOps (3) – Aggregation & Summarization
Detect patterns over time, Identify anomalies and outliers, Build actionable alerts, Generate SOC metrics for dashboards
2 days ago4 min read


KQL in SecOps (2) - Mastering Filtering, Projection, and Sorting
The fundamentals of querying data—filtering logs, selecting the right fields, and sorting results.
Jan 54 min read


KQL in SecOps (1) - Why Every Security Analyst Must Learn KQL
What KQL is, Why it is critical for SOCs, How analysts use it daily, Common misconceptions and best practices.
Dec 22, 20256 min read


AI and Cybersecurity: Transforming the Landscape in 2026
Explore how AI empowers both sides of the security equation, the emerging purple team collaborations that unite them, and the governance needed to keep innovation secure.
Nov 8, 20254 min read


Google Dorks - Advanced Search
Explore what Google dorks are, how to use them effectively, and provide real-world examples for practical use.
Oct 14, 20253 min read


UNC6395: From GitHub to Salesforce, Inside the Supply‑Chain Breach
A compromise of Salesloft’s GitHub kicked off a supply‑chain campaign that used stolen OAuth tokens from Drift to export data at scale from Salesforce.
Sep 11, 20254 min read


APT36 Explained: Transparent Tribe’s Tools, Targets & IOC's
APT36—also known as Transparent Tribe, Mythic Leopard, ProjectM, and Earth Karkaddan—is a Pakistan-based advanced persistent threat (APT) group active since at least 2013.
Sep 6, 20254 min read


Threat Intel the easy way with OpenCTI and Docker
How to deploy the OpenCTI (Open Cyber Threat Intelligence) platform within Docker, enabling you to aggregate and analyze threat intelligence in one place.
Aug 26, 20254 min read


Level Up Your Phishing Defense: Tools Every Techie Should Know (and Use!) 🛡️
This article breaks down the tools you can use to fight back against phishing emails, from simple checks to more advanced techniques.
Jun 18, 20254 min read


Security Onion SIEM Setup
Security Onion SIEM setup guide.
Network security monitoring, intrusion detection, and log management
May 13, 20253 min read


Wazuh XDR setup on Proxmox virtual machine
This guide will show you how to setup a Wazuh on a home proxmox server and connect your Windows clients for security monitoring.
Apr 28, 20255 min read
bottom of page



