top of page


Pyramid of Pain - Threat Hunting
The Pyramid of Pain is a model that categorizes different types of IOCs and illustrates the levels of difficulty an attacker faces.
Nov 4, 20245 min read


What is Secure Access Service Edge (SASE)?
This guide breaks down the components, benefits, challenges, and implementation considerations for SASE.
Oct 12, 20245 min read


Pentesting: Essential Techniques for Effective Security Testing
A comprehensive overview of pentesting, its phases, and commonly used tools to help you get started.
Oct 1, 20244 min read


Phishing: Prevention, Detection, and Recovery
An in-depth look at phishing, including prevention methods, detection techniques, and recovery steps in case of a compromise.
Aug 10, 20244 min read


Social Media misinformaton via bots and fake accounts
How actors use fake accounts and bots to spread misinformation and best methods to prevent these threats.
Aug 7, 20245 min read


Understanding DDoS Attacks: Methods, Tools, and Defense Strategies
Delve into how DDoS attacks are executed, tools hackers utilize, and the defensive measures companies can adopt to mitigate these threats.
Jul 31, 20244 min read


FTP and SSH Pentesting
This guide will show you how to test your network for FTP and SSH vulnerabilities and use these findings to secure it.
Jun 23, 20244 min read


Security Analyst Tools
A Security Operations Center (SOC) analyst uses a variety of tools to monitor, detect, analyze, and respond to cybersecurity threats.
Jun 9, 20244 min read


Amiga Emulation on the Amiga Mini and the MiSTer FPGA
In this exploration, we will embark on a captivating odyssey through the realms of Amiga emulation on two distinct platforms: the Amiga Mini
Jan 24, 20244 min read
bottom of page



