Cyber Security Blog

On the Front Lines with Phoenix Black Ops

Automating Securing Ubuntu w/ Ansible Automating Securing Ubuntu w/ Ansible November 9, 2024 In this lightning fast tutorial we’ll go through automating …

Setting up SSH Keys Using Cloud Config Setting up SSH Keys Using Cloud Config November 8, 2024 In this tutorial we’ll cover …

Malicious Captcha’s to Malicious Copy Code Buttons Malicious Captcha’s to Malicious Copy Code Buttons October 29, 2024 Malicious Captchas Russian APT 28 …

Automate SSH Hardening with Ansible Automate SSH Hardening with Ansible September 28, 2024 In this lightning fast tutorial we’ll go through automating …

First 10 Minutes on an Ubuntu Server First 10 Minutes on an Ubuntu Server September 19, 2024 When you first boot up …

How to Setup 2FA on an SSH Server How to Setup 2FA on an SSH Server August 22, 2024 In this tutorial …

How to Change the Default SSH Server Port on Ubuntu How to Change the Default SSH Server Port on Ubuntu August 22, …

How to Install Wireshark on Ubuntu How to Install Wireshark on Ubuntu August 18, 2024 In this micro-tutorial I go through installing …

Using Wazuh for File Integrity Monitoring Using Wazuh for File Integrity Monitoring August 16, 2024 In this tutorial I go through Wazuh’s …

Installing Wazuh on Ubuntu

Installing Wazuh on Ubuntu Installing Wazuh on Ubuntu August 15, 2024 In this tutorial I go through installing Wazuh, an opensource SIEM …

Phoenix Data CS Risk Framework Phoenix Data CS Risk Framework August 14, 2024 This post outlines the Phoenix Data CS Risk Framework …

ICMP Flood DoS Attack Explained ICMP Flood DoS Attack Explained August 6, 2024 What is an ICMP Flood DoS Attack? ICMP stands …