What Are Virtual Machines, and How Do They Work?

A virtual machine (VM) is a software-based emulation of a computer. A program called a hypervisor runs on your computer. It allows you to create virtual machines–virtual computers—and configure them with an amount of RAM, hard drive space, CPU cores, and other details that would normally be provisioned in hardware. Once you’ve configured your VM, you can turn it on and install an operating system.

Misconfig Mapper: Open-source tool to uncover security misconfigurations – Help Net Security

Misconfig Mapper is an open-source CLI tool built in Golang that discovers and enumerates instances of services used within your organization. It performs large-scale detection and misconfiguration assessments, leveraging customizable templates with detection and misconfiguration fingerprints to identify potential security risks in widely used third-party software and services.

Researchers unearth two previously unknown Linux backdoors – Help Net Security

These tools are designed to maintain persistent access and execute commands stealthily, enabling prolonged intelligence gathering while evading detection.

I Started Playing CTFs and They Are My New Hobby

At its core, a CTF is both a learning tool and a game, making it a fun and interactive way to dive into cybersecurity, whether you’re a beginner or a seasoned professional. CTFs usually come in three categories: Jeopardy-style, Attack-defense, and Mixed or King of the Hill.

How To Find Listening Ports With Netstat and PowerShell

The netstat command in Windows is a useful tool for IT and Cyber professionals for tracing connections to computers. https://mshub.co.uk/find-listening-ports-netstat-and-powershell/#:~:text=To%20narrow%20down%20the%20output,often%20more%20useful%20for%20analysis.

JPCERT shares Windows Event Log tips to detect ransomware attacks

The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs.

Monitor Linux System Performance From the Terminal With These 5 Tools

Command line tools are beneficial in managing linux machines. https://www.howtogeek.com/monitor-linux-system-performance-from-the-terminal/

Top 10 Open-Source Intelligence Tools (OSINT)

OSINT tools help access, collate, and organize relevant data based on queries within the various tools. Organizations wanting to develop an OSINT practice should consider what approach they should take when leveraging these tools.

These 14 Linux Commands Helped Me Become a Better Troubleshooter

Using Linux, especially as a server, often means dealing with new errors and resolving them. Most of them are easy to fix with just a web search. But some errors may require that you do some digging. In this guide, I’m sharing some Linux commands that will help you diagnose and solve those kinds of Linux errors.

Golden Bears Cyber Patriot 17 Schedule

Here is the 2024-2025 CyberPatriot 17 Schedule. Some Dates / Times might be changeable based on the CyberPatriot Competition Windows and Advisor’s Availability.