Published inInfoSec Write-upsDetecting Threats and Responding with KQL in Microsoft SentinelStrengthening Security Posture with KQL-based threat huntingFeb 21Feb 21
Published inInfoSec Write-upsEnhance your Incident Investigation and Response capabilities with Palo Alto Cortex XDRA threat-hunting platform for robust protection and rapid resolutionFeb 19Feb 19
Published inInfoSec Write-upsHands-on Introduction to Microsoft KQLGetting started with KQL QueriesFeb 15Feb 15
How to secure your Cloud: Deploy Microsoft Sentinel in AzureStrengthening Your Cloud Security Posture in AzureFeb 41Feb 41
Published inInfoSec Write-upsSANS 2022 Holiday Hack Challenge & KringleConPCAP file & Windows event logs investigationJan 15, 2023Jan 15, 2023
Published inInfoSec Write-upsPerforming Security Gap Analysis using Breach & Attack Simulation (BAS) ToolsContinuous Testing and Auditing - Purple Teaming ActivityDec 24, 2022Dec 24, 2022
CISSP Domain 3 Notes - Security Architecture and EngineeringStudy Guide 9th editionDec 19, 2022Dec 19, 2022
Published inInfoSec Write-upsUsing Threat Intelligence data to generate MISP alertsThere are various Threat Intelligence sources that shares threat information with each other to help identify those threats in their…Dec 15, 2022Dec 15, 2022
Published inInfoSec Write-upsOperationalizing MITRE ATT&CK to harden cyber defensesTake Adversary’s perspective in Defender’s TeamDec 9, 2022Dec 9, 2022
Published inInfoSec Write-upsHTB Time [writeup]Exploiting the RCE and SSRF VulnerabilitiesDec 5, 2022Dec 5, 2022