All started with Glaucoma
Glaucoma is considered the first Spanish hacker group. They were active between 1987 and 1989. They are known as Glaucoma because they attacked the Iris network, a research network, and through the university computers they jumped to the world and to history as the first hackers recognized in Spain.
Continue reading more in this blog...
Cybersecurity
Main category addressed in this blog. We will talk about news, certifications, tools, red team, blue team and much more.
Linux
I like Linux and learning about it. If you want to get into IT you must learn Linux!.
Networks & Protocols
Understand how different devices are connected and the protocols they use.
Recent Posts
Role of Windows Registry in Digital Forensics
In the ever-expanding digital landscape, the Windows Registry stands as a critical repository of information, preserving a detailed record of a system's inner workings and user interactions. As a vital component of Windows operating systems, this hierarchical database offers a wealth of insights for digital forensics experts and cybersecurity professionals
Windows
HCI revolutionizing the IT Landscape
In today's fast-paced world of information technology, the convergence of virtualization and hyperconvergence stands as a dynamic duo, poised to revolutionize the way businesses manage their infrastructure. .
Virtualization
LLVM for Malware Obfuscation
Today, we uncover how LLVM's power has been harnessed by cybercriminals to enhance their malware obfuscation techniques, making it an elusive challenge for even the most skilled security researchers and analysts.
Malware
T-Pot? HoneyPot?!?
T-Pot, a honeypot platform that you should try!
SOC
Security Operation Center (SOC)
Let's understand what is a Security Operation Center.
SOC
Mitre ATT&CK!!!
We are going to understand why Mitre ATT&CK is important and how to use it.
Standards/Frameworks
Who's behind Gl4uc0m4 ?
My name is Miguel (aka Tempest) and I'm a software engineer with a master's degree in cybersecurity.
This project arises as my own challenge to prove myself that I am able to create content about what I am passionate. I hope you find my content useful!
Posts by tag
Greetings
Information Gathering
Attacks
Protocols
Linux
Dev
Firewalls
Cryptography
DFIR
- File type formats and Magic Numbers for Digital forensics & Malware Analysis
- Digital Forensics & Incident Response
Standards/Frameworks
- Cybersecurity Standards: PTES, OSSTMM, NIST, and OWASP
- Decoding CVSS: Prioritizing Vulnerability Security
- Cybersecurity Toys. 90 % OFF
- Mitre ATT&CK!!!
SOC
Malware
Virtualization
Windows
Vulnerability
Standards/Data
- Governance?
- A Comprehensive Guide to IRM, DLP, MDM, and CASB
- A Deep Dive into Privacy-Preserving Computation
- States of Data