Threat Hunt Walkthrough: Detecting TOR Browser Usage
A practical demonstration of structured threat hunting - from hypothesis to detection rules.
Technical projects, security implementations, and hands-on demonstrations
Threat detection, analysis, and defense strategies
A practical demonstration of structured threat hunting - from hypothesis to detection rules.
Incident Response Case Study – Brute Force Attempt (Simulation)
Professional-grade cybersecurity testing environments
When I first started in cybersecurity, I could run Nmap scans and play with Metasploit, but real enterprise environments were a different beast. I quickly...
One of the most impactful projects I've worked on for my growth in cybersecurity has been designing and building my own lab environment. A space...
One of the quirks of running a home lab is that you often uncover problems you'd rarely notice on a simple home network. Recently, I...
Core IT infrastructure and networking fundamentals
Cybersecurity doesn’t exist in a vacuum. To really understand it, you need to start with the IT basics it depends on. This post breaks down...
Essential security concepts and frameworks
This post provides a new mental model for understanding cybersecurity, likening it to building a secure city from the bedrock (CIA Triad) upwards, covering networks,...
This structured methodology turns threat hunting from art into repeatable science.
This post provides a new mental model for understanding cybersecurity, likening it to building a secure city from the bedrock (CIA Triad) upwards, covering networks,...
This post explores the evolution of APT tactics and provides a comprehensive framework for building modern detection strategies that can identify sophisticated threats through behavioral...
Cutting-edge technologies in cybersecurity
How artificial intelligence is revolutionizing threat detection, analysis, and response—giving defenders the superpowers they need to match the speed and sophistication of modern cyber threats....