DannyFREE Stuff: Cybersecurity Resources To Add To Your Toolset“If it’s free, take three”. “If it’s free, it’s for me” — Unknown17h ago17h ago
DannyLets Defend Write-up: Possible SQL InjectionIn this write-up, we’re going to be going over SOC165 — Possible SQL Injection Payload Detected from LetsDefend. I was asked to go over…Sep 6Sep 6
DannyTools Deep Dive: EDRIn the evolving world of Cybersecurity, Endpoint Detection and Response (EDR) tools have emerged as a cornerstone for organizations aiming…Aug 19Aug 19
DannyTools Deep Dive: NmapIn the vast toolbox of Cybersecurity tools, Nmap is a versatile powerhouse.Aug 14Aug 14
DannyWhat Detection Can Look Like: Open Source OptionsPreviously, we talked about Detection Engineering and how it has become a career path within Cybersecurity. What used to be subset of the…Jul 22Jul 22
DannyTools Deep Dive: SigmaRecalling our conversation about the tools of the trade that will make life easier in our Cybersecurity lives, we get into another one in…Jul 16Jul 16
DannyTools Deep Dive: RegexPreviously we talked about how there are several tools of the trade when it comes to Cybersecurity.Jul 2Jul 2
DannyDeep Dive: Tools of the Trade of CybersecurityThere are several tools that we utilize in the field of Cybersecurity.Jun 10Jun 10
DannyThreat Model: SIM SwappingPreviously we discussed Vulnerabilities, Threats, and Risk and how they all tie in together.Jun 3Jun 3