Cyber Threat Hunting - Techniques and Best Practices

Explore cyber threat hunting techniques, best practices, and real-world examples to proactively detect, analyze, and mitigate emerging security threats.

June 12, 2023 · 14 min · UncleSp1d3r

Advanced Cloud Security - Serverless Security and Misconfiguration

This article delves into advanced cloud security, focusing on serverless security and misconfiguration, providing valuable insights and tools for securing serverless applications, addressing function-level, resource-level, and infrastructure-level misconfigurations, and offering real-world examples and tools to help red teams and pen testers enhance serverless security.

June 2, 2023 · 8 min · UncleSp1d3r

Cybersecurity Frameworks - NIST, ISO, and CIS

In this article, we discussed the NIST Cybersecurity Framework, ISO/IEC 27001, and CIS Controls frameworks, their five, fourteen, and twenty controls respectively, and how they can be used by red teams and pen testers to enhance their security posture and protect against cyber attacks.

May 29, 2023 · 8 min · UncleSp1d3r

Wireless Security - Best Practices and Common Attacks

This article provides a comprehensive overview of wireless security, including technical details of wireless networking, best practices for securing wireless networks, common attacks, social engineering tactics, wireless network penetration testing, regulatory compliance, and the future of wireless security.

May 26, 2023 · 38 min · UncleSp1d3r

Advanced Threat Hunting Techniques - TTP Analysis

This article explores the importance of TTP (tactics, techniques, and procedures) analysis in detecting and mitigating cyber threats, including its role in guiding investigations, assisting in attribution, and informing predictive analysis, using examples of TTP analysis in well-known attack campaigns.

May 23, 2023 · 14 min · UncleSp1d3r

Advanced Malware Analysis - Disassembly Techniques

This article provides an in-depth overview of advanced malware analysis techniques, including manual and automated disassembly, decompilers, debuggers, and dynamic binary instrumentation (DBI), with examples of tools and outputs provided for each technique.

May 19, 2023 · 19 min · UncleSp1d3r

Industrial Control System (ICS) Security - Best Practices and Common Vulnerabilities

This article provides an in-depth analysis of the vulnerabilities and best practices for securing Industrial Control Systems (ICS) against cyber-attacks for an advanced audience of experienced security professionals, including sections on lack of network segmentation, weak authentication, outdated software and firmware, lack of monitoring and logging, vulnerable remote access, and SCADA hacking tools.

May 16, 2023 · 36 min · UncleSp1d3r

Advanced Network Security - Application Layer Firewalls

This article explores the concept of application layer firewalls, how they work, their importance in network security, and some tools used to test them.

May 15, 2023 · 18 min · UncleSp1d3r

Cyber Threat Intelligence - Best Practices and Techniques

This article discusses best practices and techniques for effective Cyber Threat Intelligence (CTI) collection, analysis, and dissemination for red teams and pen testers.

May 9, 2023 · 5 min · UncleSp1d3r

Blue Team Exercises - Threat Hunting and Incident Response

This article explores various open-source and commercial tools and techniques used in blue team exercises, threat hunting, and incident response, with a focus on providing technical details and examples for an advanced audience of experienced security professionals.

May 5, 2023 · 34 min · UncleSp1d3r