Cybersecurity
Windows logs vs Linux logs & how they help with Vulnerability Scanning
2023-10-02Windows Event Log: Is an in-depth record of events related to the system, security, and application stored on a Windows operating system. Event logs c...
What are packet sniffers & how to use Snort
2023-10-03Packet sniffers. How they work: Packet sniffers work by intercepting and logging network traffic via the wired or wireless network interface on its ho...
Slowloris DDoS & how to mitigate with NGINX
2023-10-16What is denial-of-service (DDoS) attack? Here's a brief explanation. It's a malicious attempt to disrupt the normal traffic of a targeted server by ov...
Let's dive into Security Information & Event Management (SIEM) and User and entity behavior analytics (UEBA)...
Incident response — NIST vs SANS
2023-10-24Placed side-by-side in a list format, NIST and SANS have all the same components and the same flow. The biggest difference lies in Step 3, where NIST ...
Threat intelligence APT and MISP
2023-10-29Advanced Persistent Threat aims to infiltrate a company’s computer systems and steal information or disrupt operations. APT is persistent, meaning the...
Threat hunting vs Security analytics
2023-11-10In cybersecurity threat hunting, this involves developing a specific hypothesis or theory about a potential security threat, based on available data o...
I attended the National Cyber Summit a few months ago and got this flyer. I think it might be helpful to share...
SOAR stands for Security Orchestration, Automation and Response. It is a technology solution that aims to streamline and automate the security operati...