top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?
abdelsyfane
Jan 22, 202410 min read
The SIEM Playbook: Strategies for Preventing Brute Force Cybersecurity Breaches
Author Gabrielle Hempel In the ever-evolving landscape of cybersecurity, brute force attacks remain a persistent threat to organizations...
271 views0 comments
abdelsyfane
Nov 9, 20237 min read
Let’s build a Cloud Network - 02: Internet Gateway and Route Tables
Author Jinali Pabasara Welcome to the second article in our series, where we explore fundamental networking concepts in AWS. So far,...
81 views0 comments
abdelsyfane
Oct 16, 20235 min read
Threat Hunting Metrics: The Good, The Bad and The Ugly
Author Kosta Threat hunting is a crucial aspect of information security, but measuring its effectiveness can be challenging. In this...
170 views0 comments
abdelsyfane
Sep 25, 20236 min read
Let’s build a Cloud Network- 01: VPC and Subnets
Author Jinali Pabasara Welcome to this article series, where we’ll embark on an exciting journey through fundamental networking...
92 views0 comments
abdelsyfane
Jul 31, 20237 min read
Unraveling the Where: A Deep Dive into Geolocation (GEOINT) for OSINT
Author Alex Pack Introduction Geolocation, a subset of Geospatial Intelligence (GEOINT), is a fascinating field for Open-Source...
828 views0 comments
abdelsyfane
Jul 4, 20233 min read
Build a Threat Hunting Lab. Installing and Configuring Elasticsearch and Kibana
Authors: Laiali Kazalbach and Mohamed Elsayed Technical requirements VMware Workstation with at least 6 GB of RAM, 6 CPU cores, and a 70...
107 views0 comments
abdelsyfane
Jun 19, 20238 min read
How to Use the Ransomware Control Matrix: A Step-by-Step Guide
Author Ed Rojas In the previous blog, The Ransomware Control Matrix: Introducing a New Framework, we provided a history of how and why...
138 views0 comments
abdelsyfane
Jun 5, 202311 min read
Brace for Impacket!
Detecting a Red Team (and Threat Actor) Favorite Author Micah Babinski Introduction and Objectives In this article we’ll take on the...
133 views0 comments
abdelsyfane
May 8, 20239 min read
The Defender’s Guide to Windows Services
It’s dangerous to find malicious services alone! Take this! Authors: Luke Paine & Jonathan Johnson Introduction This is the second...
114 views0 comments
abdelsyfane
Apr 10, 20235 min read
Threat Hunting Series: Detection Engineering VS Threat Hunting
Author: Kostas Threat hunting is becoming mainstream, and despite the attention it receives, many people need help to differentiate it...
49 views0 comments
abdelsyfane
Mar 27, 20238 min read
The Defender’s Guide to the Windows Registry It’s dangerous to defend the registry alone! Take this!
Authors: Luke Paine & Jonathan Johnson Introduction Welcome to the Defender’s Guide. This is a series of blog posts designed to give you...
98 views0 comments
abdelsyfane
Feb 20, 20237 min read
Catching a Wev(tutil): Threat Detection for the Rest of Us
Author Michah Babinski Originally published on Medium, November 23, 2022 Introduction In this article, I’ll discuss the importance of a...
55 views0 comments
abdelsyfane
Nov 14, 20227 min read
Threat Hunting Series: Using Threat Emulation for Threat Hunting
Originally published on October 10, 2022 on Medium. Author Kostas This post will demonstrate how threat emulation can be used for threat...
921 views0 comments
abdelsyfane
Nov 7, 20224 min read
SECURITY TOOLS FOR A CYBERSECURITY PROFESSIONAL
MUST HAVE SECURITY TOOLS Previously published, May 20, 2022 on Medium Author Davies Ombasa Starting a career in cybersecurity requires...
213 views0 comments
abdelsyfane
Oct 24, 20226 min read
Sticky Fingers in the Honey Pot
\\ Author Eric Tsang Introduction A honeypot is a great tool used to detect and gain insights into hacking attempts by setting up a decoy...
128 views0 comments
abdelsyfane
Oct 10, 202212 min read
Encryption and the CIA Triad
Photo credit ia.acs.org.au Author: Siggi Bjarnason Introduction Encryption is a type of technology that is embedded in all online...
2,037 views0 comments
abdelsyfane
Aug 22, 20225 min read
Relapse of LAPSUS$: A Cyber Threat Intelligence Case Study
Originally published on 6/10/22 at Phishing For Answers. Co-Written by Kate Esprit & Meghan Jacquot Overview: LAPSUS$ Group What does...
451 views1 comment
abdelsyfane
Aug 15, 20227 min read
Threat Hunting Series: What Makes a Good Threat Hunter
Originally published June 2022 on Medium. Photo by Fahim Reza on Unsplash Continuing with the second post in this series, I felt it was...
115 views0 comments
abdelsyfane
Aug 8, 20224 min read
Threat Hunting Series: The Basics
Originally posted in June 2022 on Medium Photo by Luke Chesser on Unsplash In recent years, threat hunting has become an important...
102 views0 comments
abdelsyfane
Jun 13, 20222 min read
Wireshark: A Forensic Investigation
Author Ashlyn Matthews Ann is a fictitious character created for this exercise. Where is Ann? I received a packet capture and was tasked...
967 views0 comments
bottom of page