Homepage
Open in app
Sign in
Get started
CyberDnevnik
Journaling through Cyberspace
Follow
Process Hollowing
Process Hollowing
Injecting Malicious Code by Hollowing Out a Process
Hrvoje Filaković
Feb 9
Microsoft Extended Detection and Response (XDR) — Unified investigation and response experience
Microsoft Extended Detection and Response (XDR) — Unified investigation and response experience
If you work in a corporation, there is always a question of security. Maybe your CISO sent an email with bullet points asking how…
Vedran Brodar
Jan 31
CompTIA Security+ SY0–701: Preparation and certification
CompTIA Security+ SY0–701: Preparation and certification
My path to CompTIA Security+ certification
Martina Lenić
Jan 13
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 3
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 3
This is part 3 and the last part of the exam guide for Azure Fundamentals.
Vedran Brodar
Sep 24, 2024
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 2
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 2
If you’ve come this far I can already tell you went through my Part 1 of the exam guide for Azure Fundamentals. If you haven't use the…
Vedran Brodar
Sep 19, 2024
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 1
The Beginner’s Path to Azure: A Complete AZ-900 Study Guide — Part 1
If you want to get into the Cloud (in this case, Azure Cloud specifically), this is your fundamental exam that will get you started.
Vedran Brodar
Sep 15, 2024
Azure Key Vaults for Newbies: Secure Your Secrets with Ease
Azure Key Vaults for Newbies: Secure Your Secrets with Ease
I’m sure that you’ve had situations where you have asked yourself “OK, I have some certificates that we are using for SSL/TLS, also a few…
Vedran Brodar
Aug 2, 2024
Global IT outage — BSOD and CrowdStrike
Global IT outage — BSOD and CrowdStrike
Last week we witnessed one of the largest IT outages affecting the travel, banking, business, and health sectors worldwide in the form of…
Martina Lenić
Jul 23, 2024
Inside PC Health Check: Reversing Compatibility Checks — Part 2
Inside PC Health Check: Reversing Compatibility Checks — Part 2
Table of Contents
Hrvoje Filaković
Jul 19, 2024
Stop Drowning in Data: Tame Your Azure Logs with KQL
Stop Drowning in Data: Tame Your Azure Logs with KQL
You’ve probably found yourself in a situation where you have lots of logs coming into your Log Analytics Workspace for Sentinel or Azure…
Vedran Brodar
Jul 7, 2024
Exposure Management with CrowdStrike
Exposure Management with CrowdStrike
Vulnerability and asset management merged together to serve and support an organization’s security posture in a greater manner.
Martina Lenić
Jun 28, 2024
Inside PC Health Check: Reversing Compatibility Checks — Part 1
Inside PC Health Check: Reversing Compatibility Checks — Part 1
Table of Contents
Hrvoje Filaković
Jun 14, 2024
Unlock the Power of Proactive Security: Why You Need Microsoft Sentinel
Unlock the Power of Proactive Security: Why You Need Microsoft Sentinel
If you have different data sources coming in from various types of machines, firewalls, log forwarders, network security groups, etc…
Vedran Brodar
May 17, 2024
Proper client communication – storytelling
Proper client communication – storytelling
How to get the job done while nurturing healthy and positive relationship with the client — my experience.
Martina Lenić
May 5, 2024
DDoS attacks on your Azure environment? Azure DDoS Protection got you covered
DDoS attacks on your Azure environment? Azure DDoS Protection got you covered
“A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or…
Vedran Brodar
Apr 9, 2024
Introduction to Reverse Engineering
Introduction to Reverse Engineering
Table of Contents
Hrvoje Filaković
Mar 26, 2024
CrowdStrike — moving EDR/MDR/XDR boundaries and making it worth
CrowdStrike — moving EDR/MDR/XDR boundaries and making it worth
For several years, CrowdStrike has been recognized as a Leader for EDR (Endpoint Detection and Response) and EPP (Endpoint Protection…
Martina Lenić
Feb 14, 2024
Defend your Azure environment with Microsoft Defender for Cloud
Defend your Azure environment with Microsoft Defender for Cloud
You have your Azure environment set up and now you are wondering what you can do to protect your deployed resources. Well, I’m here to help…
Vedran Brodar
Jan 24, 2024
Want to become Azure Cloud certified? Say no more!
Want to become Azure Cloud certified? Say no more!
In my previous article I wrote about the cybersecurity skill gap and how to fix it. As promised, this article will be more focused on cloud…
Vedran Brodar
Dec 20, 2023
Endpoint Security: EDR/MDR/XDR solutions
Endpoint Security: EDR/MDR/XDR solutions
Differences, capabilities and examples
Martina Lenić
Dec 1, 2023
About CyberDnevnik
Latest Stories
Archive
About Medium
Terms
Privacy
Teams