PinnedAmine MoussaInstalling and Configuring Suricata: A Comprehensive GuideSuricata is an advanced open-source network threat detection engine that provides Intrusion Detection Systems (IDS) and Intrusion…Sep 30Sep 30
PinnedAmine MoussaStep-by-Step Guide to Installing Wazuh and Wazuh Agent for Enhanced Security MonitoringIntroduction:May 28May 28
PinnedAmine MoussaHow to Install and Run OPNsense on Kali Linux: A Step-by-Step GuideIntroductionJul 16Jul 16
PinnedAmine MoussaSimplifying Docker Management with Portainer: A Step-by-Step GuideDocker has revolutionized the way we deploy and manage applications, providing a lightweight and efficient solution for containerization…Apr 8Apr 8
Amine MoussaUnlocking the Power of Cortex: A Comprehensive Guide to Installation and UtilizationWelcome to our guide on Cortex, the open-source solution revolutionizing threat intelligence analysis and response. In this blog, we’ll…Apr 13Apr 13
Amine MoussaSetting Up TheHive 5: A Comprehensive GuideIn today’s digital landscape, cybersecurity incidents are becoming increasingly common and complex. To effectively combat these threats…Apr 12Apr 12
Amine MoussaEffortless Elasticsearch Deployment with Docker: A Quick Setup GuideElasticsearch is a distributed, RESTful search and analytics engine designed for scalability, speed, and reliability. It is built on top of…Apr 11Apr 11