KHOI | Blog
Learning Go — Week 1 · 1 min read
2023-11-18Week 1 of learning Golang. Here are a few things I found interesting about Go: 1. Go is sort of Object-Oriented...
CompTIA Roadmap · 1 min read
2023-11-14I attended the National Cyber Summit a few months ago and got this flyer. I think it might be helpful to share...
Hosting my own ActivityPub server · 4 min read
2023-11-12I love self-hosting. The idea of running someone else's software is beautiful and satisfying. Like learning how to bake a cake from a recipe, if it tu...
Threat hunting vs Security analytics · 6 min read
2023-11-10In cybersecurity threat hunting, this involves developing a specific hypothesis or theory about a potential security threat, based on available data o...
Guide to renting · 2 min read
2023-11-10I'm about to graduate and looking to rent an apartment. Here're some takeaways that I learned from these videos...
Threat intelligence APT and MISP · 9 min read
2023-10-29Advanced Persistent Threat aims to infiltrate a company’s computer systems and steal information or disrupt operations. APT is persistent, meaning the...
Incident response — NIST vs SANS · 11 min read
2023-10-24Placed side-by-side in a list format, NIST and SANS have all the same components and the same flow. The biggest difference lies in Step 3, where NIST ...
What are SIEM and UEBA? · 6 min read
2023-10-18Let's dive into Security Information & Event Management (SIEM) and User and entity behavior analytics (UEBA)...
Slowloris DDoS & how to mitigate with NGINX · 12 min read
2023-10-16What is denial-of-service (DDoS) attack? Here's a brief explanation. It's a malicious attempt to disrupt the normal traffic of a targeted server by ov...
10 ways to prevent zero-day attacks · 8 min read
2023-10-16A zero day (or 0-day) vulnerability is a security risk in a piece of software that is not publicly known about and the vendor is not aware of. These a...