All Posts
- OAuth 2.0 Protocol: Primer introductory Technical briefing 2025-09-24
- Primer: Building Secure, Compliant & Cost-Efficient Domain-Specific LLMs for Cyber-Security & Infrastructure Teams 2025-08-21
- Primer - Converting Python Applications to Go: A Strategic Advantage for Classified Environments 2025-08-20
- Primer - Intro into writing better Cobalt Strike Beacons 2025-06-18
- Primer - Bypassing Cloudflare Protection in Red Team Engagements 2025-06-18
- Enterprise Security Automation Framework: LLM-Powered CodeQL Integration for ACME Critical-Widget 2025-05-22
- Java App Security: Threat Detection, Monitoring & Automated Response 2025-05-14
- Primer - AI collaborative Faraday workflows 2025-05-14
- Cross-Environment UEBA 2025-05-14
- Primer - Privacy focused Messaging 2025-05-13
- Primer AWS WAF - Managing OWASP top 10 rules 2025-05-12
- Burp Primer - WSTG ASVS Burp Vuldb Synk 2025-05-12
- Primer - Java common mistakes 2025-05-12
- Primer - OSINT Guide 2025-05-12
- Primer - SQL common mistakes 2025-05-12
- Burp Primer - Using WSTG and DVWA for WebApp elearning 2025-05-12
- Threat Hunting Primer - Azure IOC Detection Cobalt Strike 2025-05-12
- Threat Hunting Primer - Section 1: Intro & Overview - Cloud Threat Hunting 2025-05-12
- Threat Hunting Primer - Section 2: AWS Primer - Threat Hunting Products 2025-05-12
- Threat Hunting Primer - Section 3: Azure Primer - Azure elements & KQL Deep Dive 2025-05-12
- Threat Hunting Primer - Section 4: GCP Primer -Threat Hunting w/ Google SecOps Integration 2025-05-12
- Threat Hunting Primer - Section 5: YARA Primer -YARA Rules for Cloud Threat Detection 2025-05-12
- Threat Hunting Primer - Section 6: AI-Driven Threat Intelligence Automation 2025-05-12
- Threat Hunting Primer - Section 7: Cross-Cloud Correlation Using Elastic AI 2025-05-12
- Threat Hunting Primer - Section 8: CI/CD Integration for Threat Defense 2025-05-12
- Threat Hunting Primer - Section 9: Conclusion & Next Steps 2025-05-12
- Java Secure Coding: Beyond Oracle’s Guidelines 2025-05-11
- Primer - Java Secure Coding Guide 2025-05-11
- How Not to Write Git Commit Comments 2025-05-11
- How to Work with Anyone and Get Things Done Efficiently 2025-05-11
- UltraDNS Enterprise Security first-look 2025-05-10
- CWE Top 25: Programmatic Errors That Cause Vulnerabilities in Java 2025-05-08
- Java: SAST/DAST/SCA 2025-05-06
- Elastic AI: Yara rules primer for assumed-breach 2025-05-06
- Elastic AI: Yara primer 2025-05-06
- Retool Self-Hosting Installation Guide 2025-04-17
- Course: 5-Day Healthcare Cybersecurity Boot Camp, Medical Device Security 2025-01-12
- The Zero-Trace Vault: A Fully Deniable Encryption System for Extreme Privacy 2023-11-20