back to top

c++

Windows Log Analysis – SIEMless Threat Hunting

It is commonly considered that threat hunting is a more advanced skill utilized only by companies with more mature cybersecurity programs. To a certain extent, that is accurate. SMBs may have some simple firewalls...

Ransomware Analysis Basics

Let's be honest... If the criminals do everything perfectly, getting your data back after a ransomware attack is nearly impossible without their key, and getting the key means paying the ransom. Is it impossible?...

UC – Detection via Deception

Adrian Sanabria explains why deception is the most overlooked opportunity in security operations today. This Free Upskill Challenge provides an introduction into how honeypots and honeytokens can be used as a cheat code for...

Mental Fortitude for Hackers

This may seem a bit odd coming from a site dedicated to teaching deep technical topics to skilled practitioners. Then again, I am a former mindfulness coach and yoga instructor turned pentester, so go...