2 min read
Common Types of Malware—and How to Defend Against Them
Malware, which is short for malicious software, is any software that is designed to cause damage to computer systems, networks, or devices. Malware...
The intersection of cyber tradecraft, careers, and the latest news.
Wanna get notified of new content?
Subscribe2 min read
Malware, which is short for malicious software, is any software that is designed to cause damage to computer systems, networks, or devices. Malware...
4 min read
Here’s a scenario: a cybersecurity analyst might have to respond to a network that has been compromised by sophisticated malware evading traditional...
2 min read
Senit Lutgen is a student in the Winter 2023 Cohort of our Cyber Defense Analyst Bootcamp. Below, he details some of the tell-tale signs that a...
3 min read
Cyber hygiene. It’s a term thrown around quite a bit in the cybersecurity industry, but what is it?
10 min read
This is part four of a four-part series on how to set up your own home lab with ELK. Read part one, part two, and part three.
7 min read
This is part two of a four-part series on how to set up your own home lab with ELK. Read part one.
9 min read
This is part three of a four-part series on how to set up your own home lab with ELK. Read part one and part two.
7 min read
Note: This is a guide that I wrote for my own home lab setup. It is not using the latest version of ELK, and there are many other great ways to get...