Digital Forensics & Incident Response vs Hunt

Digital Forensics & Incident Response vs Hunt

Gone are the days of defense solely relying on systems being patched. The model of hiding behind firewalls like the Greeks in Troy.  This has been proven, time and time again, to be as faulty in Cyber as it was in the days of old. There aren’t many hard...
Strategies of the Cyber Hunt

Strategies of the Cyber Hunt

Definition of Cyber Hunting by our good friends at Wikipedia: “Cyber threat hunting is “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” This is in...
Goodbye 2017, Welcome 2018!

Goodbye 2017, Welcome 2018!

Thank you readers, community contributors, and supporters!  We’ve had a busy year both on and off the keyboard and would be remiss to not give a recap of what we (Not just the HM staff, but you too!) have accomplished!  We have exciting projects in store for...
Protectli 6-Vault Review – pfSense, ESXi, ELK

Protectli 6-Vault Review – pfSense, ESXi, ELK

Homelabbers rejoice! In this review we are welcoming the Protectli 6 Port Vault to the home security hardware market. We have been in the market for something like this for a few months and while researching several products we stumbled across a CPU requirement for...

Linux File Structure

Overview This lesson will not re-invent the wheel by teaching another linux file structure lesson. There are many other articles that already discuss that topic in detail. What this lesson hopes to accomplish is give the reader an understanding of why it is important...