top of page


Threat Intel the easy way with OpenCTI and Docker
How to deploy the OpenCTI (Open Cyber Threat Intelligence) platform within Docker, enabling you to aggregate and analyze threat intelligence in one place.
Aug 26, 20254 min read


Stay Safe: Understanding the WinRAR Vulnerability (CVE-2025-8088)
This flaw impacts WinRAR versions prior to 7.13 and leverages a directory traversal bug to allow attackers to drop and execute malicious code on a target system without the victim’s knowledge.
Aug 11, 20253 min read


Mastering KQL: The Key to Enhancing Cybersecurity with Microsoft Sentinel
Delve into what KQL is, how it powers Microsoft Sentinel, and how cyber defenders can harness it to strengthen security postures with practical query example.
Jul 23, 20254 min read


Level Up Your Phishing Defense: Tools Every Techie Should Know (and Use!) 🛡️
This article breaks down the tools you can use to fight back against phishing emails, from simple checks to more advanced techniques.
Jun 18, 20254 min read


Infostealer Malware Explained: How It Works, Real-World Examples, and How to Stay Safe
Discover what infostealer malware is, how it operates, real-life examples like RedLine, Vidar, and Raccoon Stealer, and learn effective cybersecurity measures to protect your sensitive data.
May 28, 20254 min read


Security Onion SIEM Setup
Security Onion SIEM setup guide.
Network security monitoring, intrusion detection, and log management
May 13, 20253 min read


Wazuh XDR setup on Proxmox virtual machine
This guide will show you how to setup a Wazuh on a home proxmox server and connect your Windows clients for security monitoring.
Apr 28, 20255 min read


Network Troubleshooting using the OSI Model
Network troubleshooting using the OSI model involves identifying and resolving issues at each layer of the OSI model.
Apr 2, 20254 min read


Using PowerShell for Security Investigations
This guide outlines how to use PowerShell effectively for blue team security testing.
Mar 12, 20254 min read
bottom of page



