Forensics

Cybersecurity exercises – benefits and practical aspects (part 1 of 2)

What are cybersecurity exercises and why you should participate (part 1 of 2)

Understanding and Configuring Snort Rules

In this article, I am going to explain about snort rules, and how we can configure the snort rules to get alerts in case of any intrusion.

Introduction to Honeypots

In this article we will give an overview of honeypots, their purpose, and how to use them.

Introduction to Sysdig Falco

Sysdig Falco is a new open source Linux endpoint monitoring tool, useful for security monitoring. Let’s learn how it works!

Introduction to osquery for Threat Detection & DFIR

osquery is a free and powerful endpoint visibility tool. This is an introduction on how to use osquery for DFIR and threat detection use cases.

Learn by Category