Articles by Tag #blueteam

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

When Malware Starts Prompt-Engineering Itself

Somewhere right now, there’s a sketchy little script on a compromised Windows box asking an AI model...

Learn More 0 0Dec 5 '25

Deep Dive into Zero-Day Exploits: Part 2

Originally published at Cyberpath In Part 1, we explored the lifecycle of zero-day exploits,...

Learn More 0 0Jan 2

Red Team vs. Blue Team: Strategies for Advanced Penetration Testing

Originally published at Cyberpath As cybersecurity threats evolve in complexity and scale, the...

Learn More 0 0Jan 2

Security Isn’t A Solo Sport: Community, Burnout, and Identity at BSides312

Chicago's Irish American Heritage Center stands as a testament to the enduring spirit of community...

Learn More 1 0Jun 13 '25

Hack Smarter, Not Harder: Engineering a Self Documenting Shell Framework

Why Aliases Matter: Beyond Shortcuts If you treat aliases like mere shortcuts, you’re missing out...

Learn More 1 0Jul 27 '25

Welcome to my Dev profil 👋

👋 Welcome to My Lab — Blue Team Projects & Cybersecurity Journey Hi, I’m a student in...

Learn More 0 0Jun 3 '25

LetsDefend SIEM Alert: Follina 0-Day Detected EventID: 123

Hi there!, we're going to analyze and investigate a zero-day vulnerability: the CVE-2022-30190 a.k.a....

Learn More 0 0Mar 17 '25

The Role of Termux in Red Team vs Blue Team Exercises

Red vs Blue team exercises are essential in cybersecurity training. They simulate real-world attacks...

Learn More 0 0Aug 5 '25

Level Up Your Blue Team Skills with SOCLabs 🚀

Cybersecurity is not just about building firewalls or patching systems. For blue team...

Learn More 0 0Aug 22 '25

Building a Detection Foundation: Part 2 - Windows Security Events

This article highlights the critical importance of configuring Windows Advanced Audit Policy...

Learn More 0 0Mar 6

I Got Tired of Guessing About Linux Security — So I Built a One-Command Snapshot

Most Linux servers don’t fail loudly when something goes wrong. They drift. A new cron job. A...

Learn More 0 0Jan 1

I Got Tired of Guessing About Linux Security — So I Built a One-Command Snapshot

Most Linux servers don’t fail loudly when something goes wrong. They drift. A new cron job. A...

Learn More 0 0Jan 1

Building a Detection Foundation: Part 1 - The Single-Source Problem

Many organizations rely exclusively on Endpoint Detection and Response (EDR) or Antivirus (AV) for...

Learn More 0 0Feb 26