Maik Romaikroservice.com·Aug 29, 2023How to get started with Monitoring on the Blue Team: A Step-By-Step GuideFirst up - What is the Blue Team anyway? Good Question - the Blue Team is typically not just a single team. It is a combination of multiple security disciplines combined for ease of speech. Similar to how Red Team sometimes means pentester as well. W...Discuss·451 readsSIEM
Secdrillsecdrill.hashnode.dev·Aug 25, 2023Basic Practice for Server SecurityOn the Internet, thousands of Servers are vulnerable and misconfigured out there not well maintained and patched. As a server maintainer, SysAdmins needs to configure the system well to tackle the security breach that is happening on hundreds of serv...Discuss·1 likeSecurity
Brendan Mejiathecyberstudent.hashnode.dev·Aug 17, 2023Log 3 - CIA TriadAh yes, the good ol' CIA triad that is vital, and in all honesty is the foundation of cybersecurity. Typically, for my fellow junior analysts here, I wouldn't find it surprising if for almost every other interview you had been asked the question "Wha...DiscussCIA TRIAD
Brendan Mejiathecyberstudent.hashnode.dev·Aug 16, 2023Log 2 - Security Blue Team Level 1 exam/course overviewStanding ovation for the team over at Security Blue Team to deliver such an amazing course that if you were to take only this exam alone before starting your first day on the job as a Junior Security Analyst you will be in good standing. Background I...Discuss·451 readsblueteam
Brendan Mejiathecyberstudent.hashnode.dev·Aug 15, 2023Log 1 - Security Blue Team Level 1 (Personal experience not exam overview)Good evening or night is it? Currently around 10 PM EST. Regardless, like the title says I took https://www.securityblue.team/'s Level 1 certification and wanted to go over my personal story leading up to the exam, not the exam itself. I will go over...Discuss·49 reads#cybersecurity
bmurrbmurrtech.hashnode.dev·Aug 4, 2023Build your own #malware #analysis #sandbox!An overview of what it takes to build your own #malware #analysis #sandbox! The core steps are (but not limited to): 1 — Virtualize Start with a #freeware #hypervisor like #Oracle #VirtualBox. For a malware #analysis lab, you’ll want a #free #Windows...Discusscybersecurity
muhammad zubairdev.muhammadzubair220.xyz·Jul 17, 2023Glossary CybersecurityTerms and definitions from the certificate A Absolute file path: The full file path, which starts from the root Access controls: Security controls that manage access, authorization, and accountability of information Active packet sniffing: A type of ...Discuss#cybersecurity
WhatDoesKmean?loggar.hashnode.dev·Jul 3, 2023Decoding Wazuh Security Alerts: Unveiling the Mystery Behind UncertaintyIntroduction Despite implementing robust security measures, it is not uncommon to encounter odd security alerts that leave us questioning their true significance. Sometimes, in the middle of a constant stream of notifications, we can find ourselves s...Discuss·7 likes·564 reads#cybersecurity
Dwayne McDanielforGitGuardiangitguardian.hashnode.dev·May 15, 2023GitGuardian at AppSec Village: Honeytokens for the blue teamYou might have already heard that GitGuardian went to RSA Conference 2023. Aside from all the excitement of the sessions, meeting the thousands of people at our booth in the Expo Hall, and all the amazing networking afterparties, the GitGuardian team...Discussconference
Bisola Adedijibeesola.hashnode.dev·May 10, 2023Tweetdeck for Cybersecurity: Building a Tweetdeck Dashboard for Real-Time Threat IntelligenceIntroduction On average, I spend at least an hour of my day on Twitter. One of my favourite sects of Twitter is #infosecTwitter. It is a great way for me to keep up with the latest happenings in cybersecurity while having fun. However, there is a lot...Discuss·3 likes·88 reads#cybersecurity