PinnedPublished inInfoSec Write-upsWindows Event IDs That Every Cybersecurity Analyst MUST KnowUncovering Threats with Critical Windows Event IDsAug 11, 20243Aug 11, 20243
Published inInfoSec Write-upsCreating a CTF Machine with Docker and Docker Compose: A Step-by-Step GuideLet’s Try To Create one5d ago5d ago
Published inInfoSec Write-upsHow to Set Up a Vulnerable Windows VM for Creating CTF MachinesA Step-by-Step Guide to Building Challenging CTF Environments Using a Windows Virtual MachineJan 25Jan 25
Published inFAUN — Developer Community 🐾It’s Never Too Late to Start Your Cybersecurity CareerBreaking BarriersJan 71Jan 71
Published inOSINT TeamWhat Are IOC and IOA in Cybersecurity?Detecting Cyber Threats: The Role of IOCs and IOAs in Keeping Systems SafeDec 8, 20241Dec 8, 20241
Published inInfoSec Write-upsHow Hackers Turn Your Information into a WeaponPersonal and Sensitive Data is as Valuable as GoldNov 15, 2024Nov 15, 2024
Published inOSINT TeamRaising Awareness About Bring Your Own Land ( BYOL) AttacksBYOL Attacks: What You Need to KnowSep 30, 20241Sep 30, 20241
Published inInfoSec Write-upsPowershell Network CommandesExplore the Strengths of PowerShell for Efficient Network Management and TroubleshootingSep 29, 20241Sep 29, 20241
Published inOSINT TeamInjection Vulnerabilities: More Than You ThinkUncovering the Hidden Dangers Beyond Injection VulnerabilitiesSep 28, 2024Sep 28, 2024
Published inInfoSec Write-upsWindows Processes Exploited: Uncovering Hacker Tactics for PersistenceA Dive into How Attackers Manipulate Common Windows Processes to Evade Detection and Maintain ControlSep 11, 2024Sep 11, 2024
Published inInfoSec Write-upsEssential Windows Network Commands Every SOC Analyst Must KnowMastering these commands will empower you to effectively investigate and respond to network security incidentsSep 9, 2024Sep 9, 2024
Published inOSINT TeamRed Team vs Blue Team: Simulating Attacks to Test EDR EffectivenessA Showdown with Aurora EDR and Atomic Red TeamSep 6, 20241Sep 6, 20241
Published inInfoSec Write-upsBuffer Overflow: The SLMail POP3 VulnerabilityExploring the SLMail POP3 Buffer Overflow Vulnerability: Mechanisms and ImplicationsAug 28, 2024Aug 28, 2024
Published inInfoSec Write-upsHoneypots: The Secret Weapon of CybersecurityA Deep Dive into Types, Benefits, and a Simple LabAug 24, 2024Aug 24, 2024
Published inInfoSec Write-upsWindows Event IDs 4625 and 4771: A Deep Dive into Failed Authentication AttemptsUncovering Security Threats and Vulnerabilities Through Windows Event Log AnalysisAug 18, 2024Aug 18, 2024
Published inOSINT TeamNIST’s Three New Cryptographic Algorithms to Defend Against Quantum ComputersEnsuring Future-Proof Security: Understanding NIST’s Quantum-Resistant Cryptographic StandardsAug 16, 2024Aug 16, 2024
Published inInfoSec Write-upsThe Power of Multi-Factor Authentication: Securing Your Digital WorldWhy Adding Extra Layers of Security Makes All the DifferenceAug 14, 2024Aug 14, 2024
Published inOSINT TeamTop 5 Cybersecurity Podcasts in 2024Top Cybersecurity Podcasts to Keep You Informed and EngagedAug 13, 20241Aug 13, 20241
Published inInfoSec Write-upsPreventing SQL InjectionImplementing Robust Techniques to Safeguard Your Database from Malicious ExploitsAug 12, 2024Aug 12, 2024