CyberSec

 

Detection Engineering: ELK Stack with Fleet

Intro Last month, my team and I participated in the CCDC competition – an exciting cyber defense challenge where teams

 

Exploring Web Security with OWASP BWA

In this blog post, I’ll take you through my hands-on exploration of common web vulnerabilities using the OWASP Broken Web

 

OAuth 2.0 — Security Considerations

Background Previously, the common way for granting authenticated access to web applications was through the use of a username and

 

Cookie’s SameSite Attribute vs CSRF — Demystified

Ambient Authority in the browser Whenever the browser sends off an HTTP request, it includes all the corresponding cookies for

FFUF — Everything You Need To Know

FFUF, short for “Fuzz Faster you Fool” is an open-source web fuzzing tool written in Go programming language, intended for

Lockheed Martin Cyber Kill Chain — Illustrated

The cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the

CURL — Everything You Need To Know

curl is a command-line utility for transferring data from or to a server designed to work without user interaction. With curl, you

NIST Methodology of Incident Response — Illustrated

In this article, we will act as a network defender and apply our expertise in intrusion detection and response skills

Cybersecurity Compliance

An Overview of Cybersecurity Compliance

A cyber attack! [delay- a half minute] Again another one! Did you know there is a malicious attack every other