Skip to main content

Blue Team

Advanced Cloud Security: Serverless Security and Misconfiguration

··1614 words·8 mins· loading · loading
This article delves into advanced cloud security, focusing on serverless security and misconfiguration, providing valuable insights and tools for securing serverless applications, addressing function-level, resource-level, and infrastructure-level misconfigurations, and offering real-world examples and tools to help red teams and pen testers enhance serverless security.

Cybersecurity Frameworks - NIST, ISO, and CIS

··1536 words·8 mins· loading · loading
In this article, we discussed the NIST Cybersecurity Framework, ISO/IEC 27001, and CIS Controls frameworks, their five, fourteen, and twenty controls respectively, and how they can be used by red teams and pen testers to enhance their security posture and protect against cyber attacks.

Wireless Security - Best Practices and Common Attacks

··8021 words·38 mins· loading · loading
This article provides a comprehensive overview of wireless security, including technical details of wireless networking, best practices for securing wireless networks, common attacks, social engineering tactics, wireless network penetration testing, regulatory compliance, and the future of wireless security.

Advanced Threat Hunting Techniques - TTP Analysis

··2820 words·14 mins· loading · loading
This article explores the importance of TTP (tactics, techniques, and procedures) analysis in detecting and mitigating cyber threats, including its role in guiding investigations, assisting in attribution, and informing predictive analysis, using examples of TTP analysis in well-known attack campaigns.

Industrial Control System (ICS) Security: Best Practices and Common Vulnerabilities

··7786 words·37 mins· loading · loading
This article provides an in-depth analysis of the vulnerabilities and best practices for securing Industrial Control Systems (ICS) against cyber-attacks for an advanced audience of experienced security professionals, including sections on lack of network segmentation, weak authentication, outdated software and firmware, lack of monitoring and logging, vulnerable remote access, and SCADA hacking tools.

Blue Team Exercises: Threat Hunting and Incident Response

··7114 words·34 mins· loading · loading
This article explores various open-source and commercial tools and techniques used in blue team exercises, threat hunting, and incident response, with a focus on providing technical details and examples for an advanced audience of experienced security professionals.