Pinned40 Google Dorks that you can use for various purposesHere are 40 Google Dorks that you can use for various purposes, including finding vulnerabilities, sensitive information, and more:Oct 28, 2023Oct 28, 2023
Red Team Tactics and Their Detection Counterparts: A Purple Team GuideIf you’re into purple teaming, this article is for you. Let’s explore how red teams attack — and how blue teams can detect or stop them…Jun 10Jun 10
🎯 MITRE ATT&CK-Based Detection Engineering: Focus on PersistenceIn the ever-evolving world of cyber threats, security teams need a structured and threat-informed way to write detections. This is where…Jun 9Jun 9
Threat Hunting vs. Threat Detection: Key Differences & Real Use CasesThreat Hunting and Threat Detection are complementary cybersecurity practices, but they differ in approach, intent, and execution. Below, I…Jun 8Jun 8
Catching LOLBins in Action: Practical Detection QueriesLiving-Off-the-Land Binaries (LOLBins) like PowerShell, Certutil, or Rundll32 are legitimate Windows tools that attackers misuse to blend…Jun 7Jun 7
Threat Detection Using Behavioural Analytics: A Practical Guide for SOC TeamsNowadays Sophisticated attackers bypass static rules, leaving security operations centers (SOCs) scrambling to identify threats that don’t…Jun 2Jun 2
How to Create a Dashboard in Splunk EnterpriseSplunk is a powerful platform for searching, analyzing, and visualizing data, and dashboards are a key feature for presenting data insights…Jun 1Jun 1
Risk Appetite vs. Risk Tolerance: What’s the Difference and Why It MattersWhen we talk about managing risk in business, two terms often get confused: risk appetite and risk tolerance. They sound similar, but…May 22May 22
Published inInfoSec Write-upsBuilding a Risk-Aware Culture: From Compliance to OwnershipIn today’s fast-changing business world, risk is everywhere. Companies face risks from cyberattacks, market changes, regulations, and even…May 21May 21
How to Build a Risk Register That Actually Helps Decision-MakingMost organizations keep a risk register because they’re supposed to. But here’s the problem:May 20May 20