Published inThe StartupHermeticWiper: Behavioral Analysis and Indicators of AttackOn 23 Feb 2022, different cyber threat intelligence services began to witness the usage of a new disk wiper being leveraged against…Mar 11, 2022Mar 11, 2022
Published inThe StartupCollecting Windows Logs with Elastic’s WinlogbeatsBegin Threat Hunting with ElasticSep 25, 2021Sep 25, 2021
Road to $1,000,000 — Strategy and TacticsIn this post, I’m discussing how I’m going about achieving my first $1,000,000.Dec 31, 2020Dec 31, 2020
The Dawn of BioCyber WarfareThere’s been a lot of news lately surrounding the SolarWinds hack. It’s basically taking up all the news cycles in the security circles…Dec 24, 2020Dec 24, 2020
Published inThe StartupA Tale of Creating a Cell Phone TrackerOur First HackathonJul 11, 2020Jul 11, 2020
3 Questions to Ask Before Continuing or Separating from the MilitaryThings to consider either before you join the military or while still servingFeb 14, 2020Feb 14, 2020
Published inThe StartupIndexing Network Traffic with Moloch and ElasticData is EverythingFeb 4, 20201Feb 4, 20201