AWS Security Monitoring Checklist — Part 2

| | cloud computing
In Part One, we covered some important security configurations checklists relating to AWS objects such as S3, IAM and Cloudtrail. In this installment, we will continue exploring more configurations... Go on to the site to read the full article ... Read More
Vulnhub Machines Walkthrough Series — Fristileaks

Vulnhub Machines Walkthrough Series — Fristileaks

| | Hacking
In this article, we will see walkthroughs of an interesting Vulnhub machine called Fristileaks. Please note: For all of these machines, I have used the VMware workstation to provision VMs. Kali Linux... Go on to the site to read the full article ... Read More
Vulnhub Machines Walkthrough Series — PwnLab-Init

Vulnhub Machines Walkthrough Series — PwnLab-Init

| | Hacking
Continuing with our series on Vulnhub machines, in this article we will see a walkthrough of another interesting Vulnhub machine called PwnLab-Init. Note: For all these machines, I have used a VMware... Go on to the site to read the full article ... Read More

GCIH Certification Overview

The GIAC Certified Incident Handler (GCIH) is one of the most prestigious certs for IT professionals who are starting their journey into the world of Incident Handling, and even for seasoned... Go on to the site to read the full article ... Read More
Kioptrix VMs Challenge Walkthrough

Kioptrix VMs Challenge Walkthrough

| | Hacking
In this article, we will walk through all the basic Kioptrix VMs (total 5) which are available on vulnhub.com. The difficulty level of all these machines is easy, and they are categorized into... Go on to the site to read the full article ... Read More

AWS Security Monitoring Checklist

Since every organization is moving towards cloud, the roles and responsibilities of in-house security teams have increased a lot. Due to lack of complete ownership, security teams do not have... Go on to the site to read the full article ... Read More

GIAC Certifications Overview

GIAC® certifications are created and administered by the Global Information Assurance Certification and cover a variety of security domains. GIAC certifications vary from management and leadership to... Go on to the site to read the full article ... Read More
Top 6 SIEM Use Cases

Top 6 SIEM Use Cases

With rising trends and forms of attacks, most organizations today deploy a Security Incident and Event Management (SIEM) solution as a proactive measure for threat management, to get a centralized... Go on to the site to read the full article ... Read More
Osquery Tour

Osquery Tour

Since the sophistication of cyber-attacks is increasing every day, it is vital for organizations and individuals to keep track of their systems activity and ever-changing state. Attackers will try to... Go on to the site to read the full article ... Read More