Archives
- 19 Jan Security Metrics That Help Engineering Teams
- 12 Jan Linux Auditd Essentials for Privilege Escalation Detection
- 05 Jan Secrets Management for Small Teams: AWS Secrets Manager + CI
- 29 Dec Email Authentication in Practice: SPF, DKIM, and DMARC
- 22 Dec Vulnerability Management Cadence for a Home Lab
- 15 Dec Supply Chain Security in CI: SBOMs, SLSA, and Sigstore
- 09 Dec Log Clustering and Triage with LMStudio, Python, and SQLite
- 03 Dec Ransomware Recovery Lab: Immutable Backups and Restore Drills
- 27 Nov Reverse Proxy WAF with Nginx and ModSecurity
- 17 Nov Linux Binary Hardening: RELRO, PIE, NX, and CET
- 11 Nov Kerberos Attack Lab: AS-REP Roasting and Detection
- 07 Nov Container Breakout Detection with eBPF and Tracee
- 30 Oct Threat Intel Enrichment with STIX/TAXII and Python
- 24 Oct Local LLM Log Summaries with LMStudio and Python
- 14 Oct Hardening SSH: Modern Ciphers, MFA, and Audit Trails
- 07 Oct Detecting Lateral Movement with SMB and WinRM Telemetry
- 03 Oct TLS 1.3 Handshake Analysis with OpenSSL and Wireshark
- 26 Sep Home SIEM Architecture: Wazuh + OpenSearch + Zeek
- 18 Sep Practical YARA Engineering for Malware Triage
- 11 Sep Windows Telemetry in Depth: Sysmon + WEF in a Lab
- 05 Sep Detecting DNS Tunneling with Zeek, Passive DNS, and Python
- 28 Aug Building a Zeek and Suricata Dual Sensor for a Home Lab
- 19 Aug Build a Command-Line LLM with Python
- 07 Aug Cross-Site Scripting (XSS): A Technical Deep Dive
- 04 Jun Understanding the MITRE ATT&CK Framework
- 27 May Building a Home Lab Firewall
- 20 May Social Engineering Awareness
- 13 May Introduction to Threat Hunting
- 06 May Automating Tasks with Bash
- 29 Apr Incident Response Essentials
- 22 Apr Basics of File System Forensics
- 15 Apr Cryptography Fundamentals
- 08 Apr Understanding TLS and SSL
- 01 Apr Hardening Windows Systems
- 25 Mar What Are Syscalls in Linux and How Can We Use Them?
- 18 Mar Python for Security Professionals
- 14 Mar Mastering Autorecon: A Comprehensive Guide
- 11 Mar How to run a successful cybersecurity tabletop exercise
- 05 Mar Exploiting Ivanti Connect Secure RCE (CVE-2025-0282)
- 27 Feb Understanding the Slowloris Attack
- 18 Feb Why Password Strength Matters
- 11 Feb Packet Sniffing with Wireshark
- 28 Jan OWASP Top 10 Overview
- 21 Jan Intro to Virtualization
- 14 Jan Essential Linux Commands for Security
- 07 Jan Network Scanning Basics
- 02 Jan Building Your Home Lab