Billy SneedonApril 15, 2025 Turning threat intelligence into action: Key insights from our MITRE ATT&CK webinar # Turning Threat Intelligence into Action: Key Insights from Our MITRE ATT&CK Webinar In today’s digital landscape,…
Billy SneedonApril 15, 2025 5 critical cybersecurity skills gap trends for 2025 # 5 Critical Cybersecurity Skills Gap Trends for 2025 As we look ahead to 2025, the cybersecurity landscape is evolving rapidly. With the…
Billy SneedonApril 15, 2025 Ransomware readiness: here is what we learned from 1,400+ players # Ransomware Readiness: Insights from Over 1,400 Players Ransomware attacks have become a significant threat in today’s digital…
Billy SneedonApril 15, 2025 EU Cyber Resilience Act: What does it mean for security & dev teams? # EU Cyber Resilience Act: What Does It Mean for Security & Dev Teams? In today’s digital world, **cybersecurity** is more…
Billy SneedonApril 15, 2025 Product roadmap 2025: Enable and scale threat readiness with Hack The Box # Product Roadmap 2025: Enable and Scale Threat Readiness with Hack The Box As we look ahead to 2025, we are excited to share our vision for…
Billy SneedonApril 15, 2025 Rethinking readiness: Key insights from our skills benchmarking webinar # Rethinking Readiness: Key Insights from Our Skills Benchmarking Webinar In today’s fast-paced world, the way we assess skills and…
Billy SneedonApril 15, 2025 Essential SOC analyst tools (+ insights from real blue teamers) # Essential SOC Analyst Tools: Insights from Real Blue Teamers In the world of cybersecurity, **Security Operations Centers (SOC)** play a…
Billy SneedonApril 15, 2025 NTDS dumping attack detection # NTDS Dumping Attack Detection In today’s digital landscape, **cybersecurity** is more important than ever. One of the critical areas…
Billy SneedonApril 15, 2025 5 Active Directory misconfigurations (& how they’re exploited) # 5 Active Directory Misconfigurations (& How They’re Exploited) Active Directory (AD) is a crucial component in many…
Billy SneedonApril 15, 2025 Malware analysis for beginners (step-by-step) # Malware Analysis for Beginners: A Step-by-Step Guide Malware is a term that refers to any software intentionally designed to cause damage to…
Billy SneedonApril 15, 2025 New Sherlocks updates: Academy recommendations, CPE credits (and more!) # New Sherlocks Updates: Academy Recommendations, CPE Credits (and More!) Are you ready to take your blue team investigations to the next…
Billy SneedonApril 15, 2025 Memory dump analysis with Signal decryption # Memory Dump Analysis with Signal Decryption In the world of cybersecurity, understanding how to analyze memory dumps is crucial. This post…