threatradar.vercel.appMicrosoft EMS (Enterprise Mobility + Security) Deployment in CybersecurityWhat is Microsoft EMS? Microsoft EMS (Enterprise Mobility + Security) is a suite of cloud-based tools that enhance cybersecurity by providing identity management, mobile device and application security, and advanced threat protection. It integrates s...Feb 17, 2025·16 min read
threatradar.vercel.appSecurity Audit and Compliance Toolkit (Windows) – A Comprehensive Guide with Code WalkthroughIntroduction to Security Audit and Compliance Toolkit In today's digital landscape, ensuring the security and compliance of our systems is crucial. With threats ranging from unauthorized access to data breaches, organizations must regularly conduct s...Sep 22, 2024·16 min read
threatradar.vercel.appMalware Analysis of Zeus Banking TrojanThe Zeus Banking Trojan has been one of the most persistent and dangerous pieces of malware to target financial institutions and end-user systems. This technical blog walks through a complete malware analysis of the Zeus Trojan using a secure, isolat...Sep 20, 2024·13 min read
threatradar.vercel.appHTB Noxious Walkthrough: LLMNR Poisoning & Network ForensicsIntroduction to HTB Noxious In this HTB lab, I dive into a real-world network forensics scenario involving an Active Directory network. The setup focuses on identifying and mitigating an LLMNR (Link-Local Multicast Name Resolution) poisoning attack, ...Sep 6, 2024·6 min read
threatradar.vercel.appHow to Create a User with a Non-Interactive Shell on LinuxIntroduction Overview of User Management on Linux User management is a critical aspect of system administration on Linux. Proper management of users ensures that only authorized personnel have access to system resources, reducing the risk of unauthor...Sep 2, 2024·6 min read