AI in the SOC: How Artificial Intelligence Became My Strongest Teammate
From Alert Fatigue to Precision Threat Hunting

Building a Basic Cyber Threat Intelligence Program for Any Size Business
Learn how to set up a basic Cyber Threat Intelligence (CTI) program for your business, regardless of its size. This guide covers the essentials, from understanding CTI to choosing the right tools and getting your team on board.

Evil Genius: Turning EDR into Malware - A Deep Dive into Shmuel Cohen's Cortex XDR Exploit
This blog post explores a groundbreaking discovery by Shmuel Cohen at SafeBreach Labs, where Palo Alto Networks' Cortex XDR, a leading EDR platform, was turned into a tool for attackers. Dive into the technical details of the exploit and its implications for cybersecurity.

Unraveling the XZ Backdoor: A Close Call for Open Source Security
An in-depth analysis of the recent XZ Backdoor incident, highlighting the resilience of the open source community in the face of a sophisticated supply chain attack. This post unpacks the details of the CVE-2024-3094 event, where a well-executed backdoor nearly compromised major Linux distributions, and the collaborative effort that led to its discovery and mitigation.

Pi-hole: Your Ultimate Solution for a Cleaner, Faster Internet Experience
Unlock the full potential of your home network with Pi-hole, the open-source software that blocks ads, trackers, and malware domains on all your devices. This guide walks you through the simple steps of installing Pi-hole using Docker, ensuring a secure, ad-free internet experience without the hassle.