1 min read

CompTIA A+: All 20 Linux commands in less than 20 minutes

During tonight’s Total Seminars Discord Study Hall, I covered all 20 Linux CLI commands you need to know in order

4 min read

Breaking Down the Cyber Kill Chain: Understanding and Defending Against Cyber Attacks

In the field of cybersecurity, one of the most widely-used frameworks for describing the stages of a cyber attack is

Python Tool: Quick Metadata, Stego, and Reverse GIS

A lightweight Python tool that accomplishes 3 objectives for the DFIR professional (scroll down for a more advanced explanation of

2 min read

“The Dark Side of AI: How Chatbots like ChatGPT Threaten Information Security”

The rise of artificial intelligence (AI) has brought about many exciting advancements in technology, but it also poses a significant

3 min read

Determining the end of a Product’s Life Cycle: a Universal problem

This post was inspired by our recent trip to Universal Studios Orlando. After 5 ride breakdowns, including 3 that happened

3 min read

Securing the Vote: A Look at the Digital Election Security Measures Needed for the Upcoming POTUS Election

The integrity of our electoral process relies on the ability to trust that every vote is counted accurately, and that

1 min read

Simple Powershell Active Directory script to harden your servers

This script will enumerate all AD servers in the specified domain and check them for critical event logs, inactive OUs,

Challenges of Cloud Based Acquisition for DFIR Professionals

One aspect of digital forensics that has garnered significant attention in recent years is the use of cloud-based services for