InqwertybykmintheinHow I get started into Threat HuntingLast two years ago, as a final year student, I was doing internship at one of the leading bank at Myanmar and meet my team leader who…Jun 4, 20201Jun 4, 20201
InOSINT TeambyAndrew BloomanBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for freeAug 2, 202418Aug 2, 202418
Viktor MaresHow I smashed the eJPT in 8 hours — Tips & TricksPaywall blocking you? Here is a friend link…Jun 12, 20222Jun 12, 20222
InInfoSec Write-upsbyElNiakMastering the eJPTv Certification: Strategies, Insights, and AI AssistanceDiscover effective strategies, personal insights, and how AI can simplify your journey to passing the eJPTv certification. Whether you’re a…Feb 17, 20241Feb 17, 20241
Umar FaroukGRC Series: NIST RMF Assess StepAfter the successful implementation of controls in a system. Organizations have to move on to the next step in the NIST RMF and that will…Jul 26, 2023Jul 26, 2023
InInfoSec Write-upsbyDavid VargheseBuilding a Virtual Security Home Lab: Part 10 - Splunk Setup & ConfigurationA step-by-step guide for building your very own Cybersecurity Home Lab using VirtualBoxFeb 9, 20243Feb 9, 20243
igor_secWazuh | Part 4 : Proof of Concept — Windows Endpoint Part 1 of 3IntroductionSep 10, 2023Sep 10, 2023
Coded ConversationsList of Cybersecurity Companies 🛡️💻🔐The Complex Landscape of Modern CybersecurityFeb 7, 20241Feb 7, 20241
InSystem WeaknessbyRoddyT3chList of Sysmon Event IDs for Threat HuntingFeatures of Sysmon:Dec 19, 2021Dec 19, 2021
SOCFortressInstalling the New Wazuh version 4.4 — The SOCFortress WayLearn how to deploy the latest version of the Wazuh-Manager, Wazuh-Indexer with full Graylog integration.May 22, 20236May 22, 20236
InSystem WeaknessbyRoddyT3chWireshark investigation: Network Traffic AnalysisIn this fictional investigation, we be acting as a SOC engineer for mock company called X-CORP, supporting the SOC infrastructure. During…Dec 9, 20232Dec 9, 20232
Locked Dorr SecuritySet up a “Host Only” Malware Testing Environment in esxiWhat if I want to use esxi instead of virtual box, ProxMox, or VMWorkstation?Nov 14, 2023Nov 14, 2023
InInfoSec Write-upsbyTaimur IjlalThis ONE Mistake Decreases The Value Of Your Cybersecurity CVAvoid this mistake when making your resumeDec 12, 20233Dec 12, 20233
Coded ConversationsHow EDR, XDR, SIEM, MDR, and SOAR Visually Work 📱💻🖥️Fortify cybersecurity defensesNov 24, 20233Nov 24, 20233
Faisal HusainiHackTheBox Writeup — NetmonHello Guys , I am Faisal Husaini and this is my writeup on Medium for Netmon machine which has retired. My username on HTB is…Jun 29, 2019Jun 29, 2019
Florian RothAbout Detection EngineeringIn recent months I’ve noticed several attempts to define the term detection engineering and thought I should share my thoughts on this…Sep 11, 20221Sep 11, 20221