Skilled in threat detection & response, with a drive for ongoing skill growth.
Website: https://rootguard.git
Mitigate by enforcing least privilege, patching, and MFA.
More tips:
rootguard.gitbook.io/cyberops/soc...
hacklido.com/blog/1117-es...
hacklido.com/blog/1117-es...
any.run/cybersecurit...
any.run/cybersecurit...
any.run/cybersecurit...
any.run/cybersecurit...
any.run/cybersecurit...
any.run/cybersecurit...
any.run/cybersecurit...
any.run/cybersecurit...
info.microsoft.com/ww-thankyou-...
info.microsoft.com/ww-thankyou-...
www.cybertriage.com/blog/soc-inv...
www.cybertriage.com/blog/soc-inv...
www.cybertriage.com/blog/windows...
www.cybertriage.com/blog/windows...
hacklido.com/blog/1107-ph...
hacklido.com/blog/1107-ph...
undev.ninja/introduction...
undev.ninja/introduction...
www.proofpoint.com/us/blog/thre...
www.proofpoint.com/us/blog/thre...
blog.talosintelligence.com/pathwiper-ta...
blog.talosintelligence.com/pathwiper-ta...
blog.sucuri.net/2025/06/fake...
blog.sucuri.net/2025/06/fake...
cyberhub.am/en/blog/2025...
cyberhub.am/en/blog/2025...
blog.doyensec.com/2025/05/08/s...
blog.doyensec.com/2025/05/08/s...
censys.com/blog/trackin...
censys.com/blog/trackin...
Exploring Azure Arc’s overlooked C2aaS potential. Attacking and Defending against its usage and exploring usecases.
blog.zsec.uk/azure-arc-c2...
Exploring Azure Arc’s overlooked C2aaS potential. Attacking and Defending against its usage and exploring usecases.
blog.zsec.uk/azure-arc-c2...
cloud.google.com/blog/topics/...
cloud.google.com/blog/topics/...
www.rapid7.com/blog/post/20...
www.rapid7.com/blog/post/20...
unit42.paloaltonetworks.com/darkcloud-st...
unit42.paloaltonetworks.com/darkcloud-st...
www.cyber.gov.au/resources-bu...
www.cyber.gov.au/resources-bu...
www.trendmicro.com/en_us/resear...
www.trendmicro.com/en_us/resear...
insinuator.net/2025/01/jigs...
insinuator.net/2025/01/jigs...
shells.systems/one-tool-to-...
shells.systems/one-tool-to-...
www.trendmicro.com/en_us/resear...
www.trendmicro.com/en_us/resear...