Feb 18 · 10 min read · What Is Defensive Security? Defensive Security focuses on understanding what needs to be protected and implementing security measures to prevent, detect, and mitigate the impact of potential attacks. Defenders work to gain visibility into systems, id...
Join discussion
Nov 21, 2025 · 4 min read · Artificial intelligence is rapidly transforming the cybersecurity landscape. While AI empowers organizations with smarter, faster, and more proactive defenses, it also opens new doors for attackers who are increasingly using automation, machine learn...
Join discussionNov 6, 2025 · 3 min read · When most people think of cybersecurity, they imagine hackers breaking into systems, but rarely think about the ones standing guard on the other side. That’s exactly what the Blue Team does, but they’re the defenders. They use advanced monitoring, an...
Join discussion
Aug 9, 2025 · 3 min read · EDR isn’t just a defensive tool, it’s a prime target. Across recent incidents, attackers have shifted from evasion to direct EDR disruption. In 2024, approximately 25% of ransomware attacks incorporated “Bring Your Own Vulnerable Driver” (BYOVD) tech...
Join discussion
Jul 29, 2025 · 7 min read · 1. Always Keep Laravel & Dependencies Updated The first and most fundamental rule of Laravel security is to always keep your framework and its dependencies updated. Laravel's core team regularly releases security patches and bug fixes. Running outdat...
Join discussion
Jun 23, 2025 · 3 min read · As someone new to cybersecurity, I recently completed a simulation on TryHackMe that helped me understand the two main areas of defensive security. I want to share what I learned, both the concepts and the hands-on experience, to clarify my own think...
Join discussionJun 6, 2025 · 2 min read · Since this is my simple home setup, I am using self-managed Splunk, and my attacker machine is Kali VM After filling in the necessary details, we will download the Splunk file for Windows The next step is to accept the license agreement and hit th...
TTaji commentedFeb 16, 2025 · 3 min read · Introduction The CIA triad is a model found in cyber security that guides an organization in protecting their data and systems. CIA is an acronym that stands for confidentiality, integrity, and availability. Sometimes this model is referred to as th...
Join discussion
Jan 16, 2025 · 5 min read · Cyber threats are constantly evolving, and attackers are always on the lookout for weak spots in systems to gain unauthorized access. One of the most effective tactics used in initial access attacks involves exploiting unpatched vulnerabilities. Thes...
Join discussion