$ Loading...
Deep dives into detection engineering, threat hunting techniques, and security research. Practical knowledge from real-world projects.
A practical guide to detecting PowerShell Empire C2 framework using Sysmon telemetry and custom Wazuh detection rules mapped to MITRE ATT&CK.
Techniques for proactively hunting lateral movement activity using Windows Event Logs, focusing on PsExec, WMI, and RDP-based techniques.
Step-by-step guide to auditing AWS IAM for security issues including overprivileged roles, unused credentials, and policy misconfigurations.