In this post, I explain different strategies that can be use to secure WordPress. I cover the basics, the plugins and more.
This post is a follow up of the post “SIEM 102 — Detect Windows bruteforce” where I explained how to create a detection Use Case to detect a Windows bruteforce.
In this post I will explain how we can enhance the original detection logic by having a lower False Positive rate.
I recently switched to Humio and transferred all the logs and automations I have. In this post I explain why I did this transfer.
It’s hard to decide where to put the efforts to secure this environment. The 18 CIS Controls can help us prioritize our efforts.
In this post I explain what is the story around the Log4j vulnerability, named Log4Shell, and why it’s on the news.
I have been asked for a reading list of cybersecurity books. I decided to document this list here so it can be used by a broader public.
If you didn't read it, I wrote a "part 1" which addresses easier challenges: https://www.tristandostaler.com/northsec-ctf-write-up-part-1/This post will be the part 2 of my write ups. Hymn This challenge was interesting for me because of my bias towards challenges of...
A first write-up for some NorthSec CTF’s challenges
In this article I explain why MEGA is my favorite cloud storage provider. The main feature I like: they encrypt everything with your password!
If you Google “Cybersecurity paths”, “Cybersecurity career” and other similar terms, you’ll find an array of results with all kind of advices all addressed at people already in the field. In this post, I’ll try to explain my take on this subject, but destined for new comers.