Incident Response 101: What to Do When You Get Hacked
A complete introduction to incident response — the NIST lifecycle, detection commands, containment procedures, recovery steps, and how to run a post-incident review.
Real-world incident response case studies and playbooks
A complete introduction to incident response — the NIST lifecycle, detection commands, containment procedures, recovery steps, and how to run a post-incident review.
A beginner’s guide to CVEs, CVSS scoring, and vulnerability management — including practical scanning tools like Trivy, OpenVAS, and Nuclei, with a simple remediation workflow.
Learn how social engineering attacks exploit human psychology — with real-world examples from Twitter and Uber breaches — and the controls that actually defend against them.
Learn the 3-2-1 backup rule and how to implement it with practical scripts and tools for Windows, macOS, and Linux — including protection against ransomware.
Learn the different types of malware — ransomware, trojans, spyware, and more — how they spread, and the practical steps to protect yourself and recover if infected.
A practical guide to recognizing phishing emails, texts, and calls — with real examples, red flags to spot, and step-by-step instructions for what to do if you get targeted.
A complete ransomware defense guide covering the full attack kill chain, prevention controls, Splunk detection rules, and a step-by-step incident response plan for when ransomware hits.
How the Mirai botnet took down half the internet using default passwords, how to find vulnerable IoT devices with Shodan, and a practical guide to network segmentation and IoT hardening.
How the Cl0p ransomware group exploited CVE-2023-34362 in MOVEit Transfer over a single holiday weekend, compromising government agencies, airlines, and healthcare providers worldwide.
How a CVSS 10.0 Apache Struts vulnerability that had a patch available went unpatched for 78 days at Equifax — resulting in the largest financial data breach in US history.