How-to How to break into red teaming Avoid the two behaviors that make it harder to get into red teaming, and engage in five learning activities to support your path to red team.
How-to How to break into red teaming - Part 2 Avoid the two behaviors that make it harder to get into red teaming. In part 2 I cover five specific actions to take for learning how to red team.
How-to How to break into red teaming - Part 1 Avoid the two behaviors that make it harder to get into red teaming. In part 1, I cover how to properly understand red teaming.
How-to Taking notes with Obsidian Obsidian is a powerful note-taking application, but with a bit of a learning curve. This post provides a brief overview and detailed setup instructions.
Hacking Hacking/Infosec Resources Hacking resources: links, tutorials, courses, and books on security. This post will continue to be updated with new resources.
Cybersecurity Regulation and Ransomware: Fix the *Right* Problem Any ransomware solutions dictated to industry that fail to primarily address the business side will be ineffective at best, and are most likely to be costly, ineffective, and burn political capital with industry and voters.
Hacking Wrapper Development for Mythic C2 This how-to walks through building a generic C# wrapper for Mythic C2 version 2.1