Tag Blue Team

Deobfuscate PowerShell From Real-World Incident

How to deobfuscate malicious PowerShell using a real-world example. Learn what you need to know now before an incident occurs!

NIST Server Hardening Best Practices

How security hardened are your servers really? Find out the free tools and methods to ensure your environment is NIST standards hardened and compliant!

Client System Hardening Best Practices & Testing

Are you looking for Client System Hardening Best Practices? Find out how you can test and improve your Windows Client environment security!

Build Honeypot Traps to Secure Your Network

Secure your network with Honeypot traps. How to add an early warning system to your network using this free tool.

Free Active Directory Security Tools

Sticky post

If you are not using these free tools to secure Active Directory, then you’re an easy target! Find the vulnerabilities lurking in your Active Directory environment before the attackers do.

Building Custom Company-Specific Wordlists

A custom company-specific wordlist is vital to conducting password audits or blocking weak passwords from being set. Read how you can build a wordlist targeted at your company and defend against weak passwords.

Password Policy Best Practices in 2023

Sticky post

How to audit and better secure Active Directory passwords. The latest updates to enterprise password policy and best practices. Tips on how you can stay up to date on breaches.

LetsDefend’s Malware Analysis: Suspicious Browser Extension Walk-Through

LetsDefend’s Malware Analysis: Suspicious Browser Extension Walk-Through. Everything you need to know to solve the challenge!

Creating Fun Cybersecurity Tabletop Exercises

Sticky post

How you can create fun and engaging cybersecurity tabletop exercises at your organization. Fulfill compliance requirements for tabletop exercises or security awareness training with the provided documents.

LetsDefend’s DFIR Challenge: IcedID Malware Family Walk-Through

A walk-through of the IcedID Malware Family for the LetsDefend’s DFIR Challenge. An analysis of the IcedID malware and how to defend against it.

« Older posts

© 2023 Cyber Gladius

    Follow Me on Mastodon

Up ↑