Feb 19 · 2 min read · Introduction In today’s hyper-connected digital world, cyberattacks have evolved from simple malware infections to complex, multi-stage campaigns involving reconnaissance, credential abuse, lateral mo
Join discussion
Jan 26 · 10 min read · Trong các cuộc tấn công mạng hiện đại, đặc biệt là các chiến dịch lateral movement và post-exploitation trong môi trường Active Directory, attacker hiếm khi “tự viết lại bánh xe”. Thay vào đó, họ tận dụng những bộ công cụ mã nguồn mở đã được kiểm chứ...
Join discussion
Jan 22 · 3 min read · What Is Detection Engineering? In today’s banking and fintech landscape, cyber threats are no longer a distant concern- they are constant, sophisticated, and financially motivated. From credential theft to insider fraud and complex money-laundering s...
Join discussion
Jan 7 · 7 min read · Introduction In support of my recent research into ICS/OT Security Operations, I wanted to set up a small, controlled environment where I could observe normal industrial network behavior identify meaningful deviations reason about that activity us...
Join discussion
Dec 27, 2025 · 4 min read · Understanding attacks is useful. Detecting, investigating and responding is what SOCs are paid for. By mapping OSI layers → MITRE ATT&CK techniques → SOC use cases, we bridge the gap between architecture knowledge and real-world SOC operations. 🧱 Ph...
Join discussion
Nov 21, 2025 · 7 min read · The alert goes off at 2:17 p.m. You count yourself lucky that this one’s in the afternoon, not morning. You drop what you’re doing, open the console, and start digging in. Oh, a significant spike in outbound traffic from a Kubernetes node. A privileg...
Join discussion
Aug 7, 2025 · 6 min read · In continuation of our cyber journey , the very important that all the cyber professional have in-hand is MITRE ATTACK FRAMEWORK. What is Mitre? The MITRE ATT&CK framework is a globally accessible, knowledge-based resource that catalogs the tactics a...
Join discussion
Jul 28, 2025 · 5 min read · Ever wondered what happens in the first few moments after a server is compromised? Thanks to monitoring attacks over many sessions, we don't have to wonder. We can watch it happen in real time. By analysing logs over many sessions, we've pieced toget...
Join discussion
Jul 26, 2025 · 3 min read · A security audit is not just a bunch of policies being checked off on a clipboard. It's a structured review of an organisation’s frameworks, controls, and compliance readiness to ensure they meet certain security expectations. Whether it’s for legal ...
Join discussion