27 May 2026
Detection & Hunting
· 10 min read
KQL queries for Entra ID sign-in log analysis. What ResultType values mean, how to filter failed sign-ins, and the queries that detect password spray, MFA fatigue, conditional access blocks, and account lockouts.
Read more →
20 May 2026
Incident Response
· 9 min read
The native Windows commands every responder needs when forensic tools aren't deployed yet. Volatile data capture with cmd and PowerShell — processes, network connections, logged-in users, scheduled tasks, and services.
Read more →
12 May 2026
Identity Security
· 8 min read
The Silverfort disclosure proved that owning a service principal means owning its permissions. Most tenants have privileged service principals with no owner governance, no credential rotation, and no attestation. Here's the audit script that finds them before an attacker does.
Read more →
3 May 2026
Incident Response & Investigation
· 8 min read
VanGuard is a cross-platform DFIR toolkit that replaces the 45-minute tooling scramble at the start of every IR engagement. Open source, air-gap compatible.
Read more →
3 May 2026
Incident Response & Investigation
· 10 min read
The sign-in log tells you how they got in. The audit log tells you what they did. Here's the sequence that turns both into a containment decision.
Read more →
3 May 2026
Detection Engineering
· 9 min read
Your detection rules cover known patterns. These five KQL hunts find the attacker activity that bypasses every analytics rule in your library.
Read more →
30 April 2026
Security Operations
· 11 min read
The queries and evidence sources you check in the first 15 minutes of a business email compromise determine whether you catch the attacker mid-operation or write the post-mortem after the wire transfer.
Read more →
28 April 2026
Security Operations
· 9 min read
After an AiTM token theft, the attacker's next move is often to register their own device to your tenant. Here is how to detect the pivot in Entra ID.
Read more →
28 April 2026
Security Operations
· 9 min read
Most security programs are compliance programs in disguise. The technology is deployed for frameworks and contracts, not threat models. Here's how to tell the difference — and why it matters when the adversary arrives.
Read more →
21 April 2026
Security Operations
· 12 min read
The honest answer to 'will AI replace SOC analysts' is more uncomfortable than either side admits. The job isn't disappearing. But the job you trained for might already be gone.
Read more →
21 April 2026
Security Operations
· 6 min read
SSH agent forwarding is a convenience feature that becomes a lateral movement highway when a bastion host is compromised. Here is how the attack works and the three log patterns that expose it.
Read more →
15 April 2026
Detection Engineering
· 7 min read
Microsoft ships 200+ Sentinel analytics rule templates. Coverage clusters around brute force, impossible travel, and known malware — leaving significant gaps in mailbox rule abuse, consent grant attacks, data staging, privilege escalation, and cross-tenant movement. Here are five detections you need to build yourself.
Read more →
7 April 2026
Security Operations
· 12 min read
Most SOCs were built for a threat landscape that no longer exists. Perimeter-era tools, single-environment playbooks, and alert-queue thinking are failing against identity-first, cross-environment attacks. Here's what the gap looks like from inside the operation.
Read more →
7 April 2026
Detection Engineering
· 5 min read
Most Linux rootkits load as kernel modules. These five auditd rules create an audit trail for every module operation — giving your SOC visibility into the one action attackers cannot avoid.
Read more →
4 April 2026
Security Operations
· 10 min read
Microsoft would like you to believe that an E5 license is a security strategy. After years operating M365 security in production and running incident response through its tools, the reality is more nuanced than the marketing deck.
Read more →