TheCyberChefEnhancing Email Security: A Guide for Dummies — Part 3Email is the cornerstone of modern digital communication, connecting individuals and organizations across the globe. However, the…Aug 1Aug 1
TheCyberChefEnhancing Email Security: A Guide for Dummies — Part 2Exploring the Technical Side of Email Infrastructure and Authentication ProtocolsJul 301Jul 301
TheCyberChefEnhancing Email Security: A Guide for DummiesStaring out in cybersecurity as SOC Analyst — intern in an MSSP, I investigated a suspicious email that slipped past our filters. I was…Jul 29Jul 29
TheCyberChefPRACTICAL INVESTIAGTION AND ANALYSIS — HOME LABWelcome, Cyber Sleuths! We’re diving into the world of cybersecurity investigation and analysis. Join me as we unravel the secrets behind…Jan 241Jan 241
TheCyberChefMONITORING AND DETECTION LAB — Part FiveWelcome back to our thrilling blog journey! So far, we’ve explored the incredible world of diverse technologies, each serving a unique…Nov 30, 2023Nov 30, 2023
TheCyberChefMONITORING AND DETECTION LAB — Part FourWelcome back to part 4 of our home lab: monitoring and detection. I hope you learnt a lot in the previous post, and are now very much…Nov 27, 2023Nov 27, 2023
TheCyberChefMONITORING AND DETECTION LAB — Part TwoWelcome back to the series on monitoring and detection! Whether you’re a new reader or a returning one, I’m thrilled to have you here…Nov 21, 20231Nov 21, 20231
TheCyberChefMONITORING AND DETECTION LAB — Part OneWelcome, cybersecurity enthusiasts! Buckle up as we embark on an electrifying journey into the realm of detection and monitoring. Imagine…Nov 17, 20233Nov 17, 20233
TheCyberChefWINDOWS SERVER SERIES — EPISODE FIVEWelcome to the Windows Server Series!Jul 4, 20231Jul 4, 20231