Secjuice
  • Technical
  • OSINT
  • Unusual Journeys
  • HoF
  • Write With Us
  • Hire A Writer
  • About Us
  • Rankings
Secprentice

Secprentice

Blue teamer sharing information to help other blue teams

13 posts •

Blue Team Detection: DarkSide Ransomware

Malware write-ups can be found in abundance online, they are often written from the point of view of a malware researcher who focuses on the deep internals of how malicious software works.

  • Secprentice
    Secprentice
8 min read
TECHNICAL

Blue Team Detection: nJRat

Cybersecurity engineer Charlie Crane on detecting malware by its behaviors which are relatively persistent and common across many malware flavors.

  • Secprentice
    Secprentice
5 min read
INFOSEC

Preventing Ransomware With Simple Security Best Practices

Some say that ransomware is a complex and expensive problem to solve, this article aims to convince you that this isn't always the case.

  • Secprentice
    Secprentice
8 min read
INFOSEC

How To Manage Vulnerabilities

Vulnerability management is the practice of finding, indexing, analyzing, and remediating weakness in systems to improve their security.

  • Secprentice
    Secprentice
7 min read
INFOSEC

How & Why You Should Remove Yourself From Windows Local Admin

Members of the admin club are allowed to do anything on a system, but you do not need to wield these godly powers for everyday browsing.

  • Secprentice
    Secprentice
6 min read
INFOSEC

Secjuice Squeeze Volume 18

Welcome to the 18th edition of Secjuice Squeeze, a curated selection of interesting security articles and news that you may have missed.

  • Secjuice
    Secjuice
  • Manmeet Singh Bhatia
    Manmeet Singh Bhatia
  • Mike Peterson
    Mike Peterson
  • Secprentice
    Secprentice
3 min read
CYBERSEC

Remote Working Cybersecurity

A closer look at some of the issues faced by cybersecurity teams grappling with the sudden exodus of workers from the office into their homes.

  • Secprentice
    Secprentice
3 min read
INFOSEC

Squeeze Volume 8 - Las Vegas Defeats Cyber Attack, Xiaomi Nest/TikTok/Citrix Vulnerabilities, & More

Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.

  • Secjuice
    Secjuice
  • Manmeet Singh Bhatia
    Manmeet Singh Bhatia
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
  • Bhumish Gajjar
    Bhumish Gajjar
  • Hozaifa Owaisi
    Hozaifa Owaisi
  • Secprentice
    Secprentice
7 min read
CYBERSEC

Simple Protection Against Ransomware (Ryuk)

In recent weeks ransomware hysteria has been sweeping the press thanks to a fresh wave of high profile infections.

  • Secprentice
    Secprentice
5 min read
TECHNICAL

PowerShell Logging and Security

This tutorial aims to help you get PowerShell logs from your endpoints into your SIEM to protect you from modern PowerShell abuse.

  • Secprentice
    Secprentice
4 min read
TECHNICAL

How To Deploy AdBlocker for Enterprise

Learn how to deploy ad-blocking software to your computers in order to protect your users from malvertising.

  • Secprentice
    Secprentice
4 min read
TECHNICAL

Feed Your SIEM With Free Threat Intelligence Feeds

Draw down free threat intelligence data to feed your security information and event management (SIEM) platform with these handy Powershell scripts.

  • Secprentice
    Secprentice
3 min read
TECHNICAL

Simple Defenses vs Advanced Malware

Defending your systems from advanced malware does not have to be difficult and costly. Learn how to improve your domain security with simple changes to tools you already own.

  • Secprentice
    Secprentice
4 min read
Secjuice © 2022
Linkedin Facebook Twitter Remote Browser Isolation