InHerkes için Vergi & FinansbyMali Müşavir Evren Özmen-CPA Evren ÖZMENSosyal Medya İçerik Üreticileri İçin Vergi Muafiyeti Artık Kimleri de Kapsıyor? Kapsamlı RehberSosyal İçerik Üreticiliği, İnternet ve Benzeri Elektronik Ortamlar Üzerinden Sunulan Hizmetler ile Mobil Cihazlar İçin Uygulama…Oct 2, 20245Oct 2, 20245
Frank LeitnerCISSP-ISSAP: My summaryAfter a long(ish) wait I received my CISSP-ISSAP (Information Systems Security Architecture Professional) certification today.Aug 15, 20231Aug 15, 20231
DataFlowXNavigating Cybersecurity Waters: Data Diodes vs. FirewallsIn the rapidly evolving landscape of cybersecurity, organizations face the critical task of selecting the right tools to safeguard their…Jan 23, 2024Jan 23, 2024
InESAS CONSULTINGbyEvaldas CerkesasValue Added Tax for freelancers in the UpworkDo you encounter uncertainty concerning Value Added Tax (VAT) imposition while freelancing in Upwork as a freelancer or agency? This…May 10, 2018May 10, 2018
Tony M ElkinsBuilding a home-lab EDR.This is based on the direction given by So you want to be a SOC Analyst? Intro — by Eric Capuano (ecapuano.com) and Uncover the Secrets of…Apr 6, 20232Apr 6, 20232
Ross Haleliuk (moved to ventureinsecurity.net)Open source in cybersecurity: a deep diveAnalyzing select aspects of the nuanced world of open source in cybersecurityOct 10, 20221Oct 10, 20221
InMITRE ATT&CK®byKatie NickelsGetting Started with ATT&CK: Threat IntelligenceGetting Started with ATT&CK from a Cyber Threat Intelligence PerspectiveJun 10, 20192Jun 10, 20192
InSystem WeaknessbyStefan BarganGetting Started with Kali Linux Purple: A Step-by-Step GuideSo, Offensive Security launched a Purple Version of Kali Linux in 2023. Now, what is it about? Well, I will let Offensive Security do…Mar 17, 20231Mar 17, 20231
SOCFortressMaximizing Threat Detection and Response with CortexCortex Analyzer and Responder: The Game-Changing Duo for Cyber Threat Detection and ResponseFeb 20, 2023Feb 20, 2023
Ibrahim Ekim IsikStatic Malware Analysis ToolsI’ll describe a few of the tools I frequently use when analyzing malware samples in this article.Mar 6, 2023Mar 6, 2023
Princewill OnyenanuHow to find out someone’s location using Grabify.Be it trying to show off your omniscience to a friend, or trying to figure out if this new Catfish is lying to you about his/her location…Aug 16, 20193Aug 16, 20193
DeepWatchHow to enter the dark web safely: a step-by-step guideWe at DeepWatch monitor illegal activities in the deep web. Our clients may from time to time examine the identified evidence themselves…Jun 7, 20176Jun 7, 20176
InInfoSec Write-upsbyStefan BarganBest CTF PlatformsI have compiled a list of Red Team/Blue Team Capture The Flag Platforms to test your skills on.Oct 8, 20223Oct 8, 20223