Blog
How to View EVTX Logs on MacOS
Feb 26, 2026
Demystifying Microsoft Entra ID: Navigating Cloud Attacks with the MITRE Framework
Oct 13, 2025
Exploring DLL Injection
Oct 2, 2025
Exploring LOLBINs
Sep 30, 2025
Exploring Rootkits
Sep 26, 2025
SOC Analyst Perspective: What is BYOVD Attack
Sep 25, 2025
What is LSASS - Part 2
Sep 24, 2025
What is LSASS - Part 1
Sep 23, 2025
SOC Analyst Perspective - AS-REP ROASTING
Sep 22, 2025
SOC Analyst Perspective - Golden Ticket Attack
Jul 17, 2025
This SOCs, But You Should Know: OSI Model (Part 1)
Feb 3, 2026