Automating User Activity to Simulate a Real Environment (Part 1: The Importance of Automation) Welcome to the first part of our series on automation in cybersecurity. This series will explore the importance of automation in modern security operations and provide practical examples. While this post isn’t a typical lab walkthrough, it’s crucial for understanding the context of our future hands-on experiments. Posted on July 09, 2025 · 11 mins read
Setting up a SIEM SIEMs….. what are they and why do we care? Posted on September 20, 2022 · 5 mins read
Windows Registry Internal finding Today whilst investigating some SolarMarker malware at a customer I discovered something really interesting about the user hive inner workings (NTUSER.dat). Posted on June 15, 2022 · 3 mins read
The Lab For a while now I have been planning to create a lab environment at home. Just something I can play around in, run some malware if needed or test some POC for exploits. Posted on June 14, 2022 · 7 mins read
Welcome to Security Through obscurity Welcome dear reader to this new blog site. ( ゚▽゚)/ Posted on May 25, 2022 · 1 min read