Sitemap - 2024 - Danny's Newsletter

Cybersecurity Interviews: Technical Round

YARA Part lll

Cybersecurity Interviews: Scenario Exercises

Email Security Analysis

3 Approaches to Continuous Cybersecurity Learning

Tools Deep Dive: YARA Part ll

Things You Can Do With Linux

Cybersecurity Interviews

Tools Deep Dive: YARA

Nuts and Bolts of Detection Engineering: Open Source Edition

The Versatility Of Linux

Lets Defend Write-up

Detection Engineering and Threat Hunting: 🤝🏼

Threat Hunting Metrics: The Good Metrics to Focus On

Community in Cybersecurity

3 Ways to Stay Current in Cybersecurity

When Cybercrime Meets Hip-Hop

FREE Stuff: Cybersecurity Resources To Add To Your Toolset

North Korean Hacker's Infiltration Attempt: Remote Work Not FTW This Time

Tools Deep Dive: EDR

We Will Rock You: RockYou2024

Tools Deep Dive: Nmap

Tools Deep Dive: Sigma

Tools Deep Dive: Regex

What Detection Can Look Like: Open Source Options

Tools of the Trade: The Command Line

Cybersecurity: Deep Dive into the Tools of the Trade

To Cert or not to Cert?

Linux: The OS of Cybersecurity

Threat Model: SIM Swapping

Thinking In The Long Term

Embrace Your Autodidact

Free Resources

Cybersecurity Career Paths: Compliance & GRC

Cybersecurity Career Paths: AppSec

Cybersecurity Career Paths: Threat Hunting

Vulnerability vs Threat vs Risk Re-visited

Cybersecurity Career Paths: Detection and Response

Free Linux Course

Detection Engineering or Threat Hunting?

Detection Engineering Series: Art or Science

Detection Engineering Series: Detections -> Alerts

Detection Engineering Series: Detection Engineering Explained

How To Stay Current in Cybersecurity

Know Your Why

The Breaches of 2023

Learning From Our Mistakes

Free Course