top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Understanding Vulnerabilities and a Remediation Walk-Through
Author Ashlyn Matthews In an attempt to practice my blue team skills, I launched a vulnerable instance from AWS and sought out to scan...
abdelsyfane
Sep 12, 20224 min read


Online Gaming - Keep Your Children Safe
In partnership with Breezeline Author Elaine Harrison-Neukirch Online gaming has become the new “arcade” of the 80’s. Kids who game...
abdelsyfane
Sep 6, 20223 min read


Unpopular Opinions in Cybersecurity
Author Swetha Kannan Cybersecurity is the most wanted career today. As the industry evolved, so much has changed. Today there are several...
abdelsyfane
Aug 29, 20224 min read


Relapse of LAPSUS$: A Cyber Threat Intelligence Case Study
Originally published on 6/10/22 at Phishing For Answers. Co-Written by Kate Esprit & Meghan Jacquot Overview: LAPSUS$ Group What does...
abdelsyfane
Aug 22, 20225 min read


Threat Hunting Series: What Makes a Good Threat Hunter
Originally published June 2022 on Medium. Photo by Fahim Reza on Unsplash Continuing with the second post in this series, I felt it was...
abdelsyfane
Aug 15, 20227 min read


Threat Hunting Series: The Basics
Originally posted in June 2022 on Medium Photo by Luke Chesser on Unsplash In recent years, threat hunting has become an important...
abdelsyfane
Aug 8, 20224 min read


What is a Supply Chain Attack?
In partnership with Breezeline Author Elaine Harrison-Neukirch Supply chain attacks are becoming increasingly frequent. These types of...
abdelsyfane
Aug 1, 20223 min read


Wild West Hackin Fest: The Return
Author Kathy Collins Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information Security chose to hold...
abdelsyfane
Jul 25, 20225 min read


Summiting the Pyramid of Pain
Author Christopher Peacock The TTP Pyramid This blog was originally published on 3/16/22 by Scythe. A Special Thanks The TTP Pyramid...
abdelsyfane
Jul 18, 20224 min read


Two Factor Authentication – Another Layer of Security
In partnership with Breezeline Author Cate Garrett Early in the morning, you finally managed to get your coffee before going to your...
abdelsyfane
Jul 11, 20223 min read


Customer Support: A Non Traditional Job in Cyber Security
Author Elaine Harrison-Neukirch I have been a Blue Teamer since the beginning of my cybersecurity career. I've worked in both the finance...
abdelsyfane
Jun 27, 20225 min read


Wireshark: A Forensic Investigation
Author Ashlyn Matthews Ann is a fictitious character created for this exercise. Where is Ann? I received a packet capture and was tasked...
abdelsyfane
Jun 13, 20222 min read


Having Passion For What You Do
Author Shary J. Llanos Antonio Lately, I've been searching within myself to transform my life and follow my passion. Career-wise, it is...
abdelsyfane
Jun 6, 20223 min read


CTI Networking Report
Originally published on January 28, 2022 on Blog.Pulsedive.com Author: Grace Chi "Is Sharing Caring? A report on current cyber threat...
abdelsyfane
May 30, 20222 min read


Capture The Flag for Beginners
Author: Cate Garrett You dream of being a cyber maven who is fluent in Python and always ready with the latest Kali distro. Yet your...
abdelsyfane
May 23, 20224 min read


Have You Heard About the Google Voice Scam?
Author: Elaine Harrison-Neukirch Recently, I listed some items for sale on Facebook Marketplace. I received a message in Facebook...
abdelsyfane
May 16, 20222 min read


If You Use the Same Passwords for Every Thing, CHANGE THEM NOW!
Author Eric Tsang After analyzing password attacks using my honeypot, one easy thing you can do to protect yourself is to have strong...
abdelsyfane
May 2, 20225 min read


What is Zero Trust?
Author: Siggi Bjarnason Overview Let us go over what zero trust is. This is the latest buzzword in the infosec/cybersecurity industry...
abdelsyfane
Apr 18, 20226 min read


Breaking Down LOLBAS Attacks With The Help Of Hunter-gatherers
This was originally published on February 4, 2022 on the Scythe blog page. Author Nathali Cano https://frontporchne.com/article/tanzanias...
abdelsyfane
Apr 4, 20226 min read


NIDS: Snort - Playing Around with Snort
Author Ashlyn Matthews What is Snort Snort is an open source, signature-based Network-based Intrusion Detection System. What does that...
abdelsyfane
Mar 21, 20223 min read
bottom of page
