
Automating Vulnerability Detection with Python: Port Scans, SQL Injection, and More
Cybersecurity is more critical than ever. Organizations, developers, and hobbyists constantly seek tools to identify vulnerabilities in web...
Unmasking a Job Offer Scam: How a Dream Job Turned Malicious
Today, we’ll be taking a break from our normal blog posts, and talk about how a job interview...

Creating a Password Generator in Python
In today’s digital world, password security is more important than ever. Weak or easily guessable passwords are a...

Creating a Malware Analyzer Tool
Hello everyone and Happy Holidays! Today, we will be creating a python tool that takes file samples, extracts...
Data Connectors in Microsoft Sentinel
Welcome back to setting up our Azure Environment for hands on experience with Sentinel. In our last blog...
Configuring Microsoft Sentinel Playbook
Hello again! Today we will be configuring our Sentinel Playbook to use with our newly created Sentinel environment....

Deploying Azure Sentinel
Welcome back! Here, we will be deploying Azure Sentinel, configuring and managing the cloud environment. If you haven’t...

Creating an Azure Environment
Welcome back! Today, we will be creating an Azure Environment, and properly configuring it so it is ready...

Diving into the Target Data Breach
The Target Data Breach is one of the most notorious cybersecurity incidents in recent cybersecurity history affecting over...