A diagram of distributed network

Sharing learnings in scripting, task automation, and threat intelligence, with an emphasis on practical applications in defensive security.

Latest Post: Hackers vs. Honeypot: Insights from 5 Days of Honeypot Activity

Every day, tens of thousands of brute force attacks are launched against servers worldwide, testing the limits of their defences. For those of us new to cybersecurity, these attacks aren’t just statistics: they’re a chance to learn. Setting up a honeypot is an invaluable way to go about this. This post looks at some of the lessons learned from 5 days of honeypot logs.

Read more

Posts: