The purpose of this blog post is to introduce new analysts to threat hunting activities, terms, tools, and the field of threat hunting. It is
What is CISSP? “The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the information security market. CISSP validates an information
As I was listening to old RSA talks, Ed Skoudis, Instructor at SANS Institute, gave his advice on incorporating a space into passwords. Below is
This is a simple guide to installing the MISP platform on an Ubuntu VM. You can find the official MISP Ubuntu 18.04 installation guide here.
The titles say it all. Below are some mathematical papers I wrote in university. Modelling the Zombie Epidemic: How to deal With Zombies is a
Shodan is an popular tool among security researchers that scans the internet looking for open ports belonging to connected devices. In 2017, Shodan partnered with