hack3rs.ca network-security
/blog :: monthly-archive

analyst@hack3rs:~/blog$ ls -R posts/

Network Security Blog

Monthly posts covering seasonal threats, defensive workflows, and tool techniques — written for analysts and defenders.

blog-structure

February 2026

  • 2026-02-20
    Insider Threat Monitoring and Access Review Discipline for Defenders

    Insider threat monitoring fails when access reviews are delayed until annual audits and sensitive-action logging is incomplete. This article covers how to identify privilege misuse through log analysis, build access review workflows that surface real risk rather than just completing a checklist, and establish a fair, evidence-based triage process for suspicious internal activity.

    $ tag: Insider Risk / Access Governance

    open article Read full post

January 2026

December 2025

November 2025

October 2025

September 2025

  • 2025-09-25
    AD Privilege Path Review and Defensive BloodHound Usage

    BloodHound isn't just an attacker tool. Defenders use it to understand which privilege paths exist before an attacker finds them. This article covers how to run BloodHound defensively, interpret the output as a lateral movement risk map, and reduce admin sprawl before year-end freezes make changes harder.

    $ tag: AD / Privilege Paths

    open article Read full post

August 2025

July 2025

  • 2025-07-24
    Wireless Rogue AP Drills and BYOD Segmentation Validation

    Wireless monitoring is easy to deprioritize until a rogue AP appears at a conference room or a BYOD device ends up on the wrong VLAN. This article covers how to run authorized wireless detection drills, validate BYOD and guest segmentation, and correlate RF activity with network-side telemetry during triage.

    $ tag: Wireless / Segmentation

    open article Read full post

June 2025

May 2025

April 2025

March 2025

February 2025

January 2025

December 2024

November 2024

  • 2024-11-21
    Holiday Commerce Surface Hardening and Web Telemetry Review

    High-traffic seasons are when web-facing systems face the most load and the least scrutiny. This article covers how to harden web exposure before traffic peaks: reviewing exposed paths, validating app hardening, monitoring error logs for probe patterns, and tying findings to remediation and alerting workflows.

    $ tag: Web Exposure / App Defense

    open article Read full post

October 2024

September 2024

August 2024

July 2024

June 2024

May 2024

April 2024

March 2024

  • 2024-03-11
    Tax Season Phishing and Credential Harvesting: A Defender Playbook

    Tax season is a reliable phishing window. Finance teams are under deadline pressure, invoices move fast, and a spoofed email from HR or payroll doesn't raise immediate flags. This playbook covers what attackers do during the March window, how to detect early signals in auth and email logs, how to triage compromised accounts without destroying evidence, and how to reduce repeat incidents through faster reporting and better identity controls.

    $ tag: Identity / Phishing

    open article Read full post