<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>hack3rs.ca — network security learning</title><description>White-hat network security learning notes, tool guides, and defender resources.</description><link>https://hack3rs.ca/</link><item><title>Insider Threat Monitoring and Access Review Discipline for Defenders</title><link>https://hack3rs.ca/blog/2026-02-insider-threat-monitoring-and-access-review-discipline/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2026-02-insider-threat-monitoring-and-access-review-discipline/</guid><description>Insider threat monitoring fails when access reviews are delayed until annual audits and sensitive-action logging is incomplete. This article covers how to identify privilege misuse through log analysis, build access review workflows that surface real risk rather than just completing a checklist, and establish a fair, evidence-based triage process for suspicious internal activity.</description><pubDate>Fri, 20 Feb 2026 00:00:00 GMT</pubDate></item><item><title>Cloud Identity Abuse Prevention Roadmap for New-Year Projects</title><link>https://hack3rs.ca/blog/2026-01-cloud-identity-abuse-prevention-roadmap-for-new-year-projects/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2026-01-cloud-identity-abuse-prevention-roadmap-for-new-year-projects/</guid><description>New-year projects are when cloud access patterns change fastest and IAM drift accelerates. This roadmap covers tightening cloud IAM, monitoring control-plane activity for anomalies, reducing privilege drift from project access, and validating exposed services before those projects go live.</description><pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate></item><item><title>Post-Incident Review and a Hardening Backlog That Actually Gets Done</title><link>https://hack3rs.ca/blog/2025-12-post-incident-review-hardening-backlog-that-actually-gets-done/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-12-post-incident-review-hardening-backlog-that-actually-gets-done/</guid><description>Post-incident reviews that produce a list of findings and no owners don&apos;t improve anything. This article covers how to run a PIR that generates actionable output: evidence-based lessons, assigned owners, realistic timelines, and hardening work that gets tracked alongside detection improvements in the same backlog.</description><pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate></item><item><title>DDoS Runbook Testing and Dependency Mapping Before Peak Load Periods</title><link>https://hack3rs.ca/blog/2025-11-ddos-runbook-testing-and-dependency-mapping-before-peak-load/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-11-ddos-runbook-testing-and-dependency-mapping-before-peak-load/</guid><description>A DDoS runbook that&apos;s never been tested is a wish list. This article covers how to validate escalation paths, map service dependencies, define thresholds that trigger real actions, and combine traffic telemetry with application health metrics so defenders know which layer is failing during an availability incident.</description><pubDate>Tue, 18 Nov 2025 00:00:00 GMT</pubDate></item><item><title>DNS Tunneling Detection Baselines for Cybersecurity Awareness Month</title><link>https://hack3rs.ca/blog/2025-10-dns-tunneling-detection-baselines-for-awareness-month/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-10-dns-tunneling-detection-baselines-for-awareness-month/</guid><description>DNS is security telemetry, not just a background service. This article covers how to build meaningful DNS baselines, recognize the query patterns that suggest tunneling or C2 activity, validate resolver paths, and reduce false positives in tunneling detection to a level where analysts actually act on the alerts.</description><pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate></item><item><title>AD Privilege Path Review and Defensive BloodHound Usage</title><link>https://hack3rs.ca/blog/2025-09-ad-privilege-path-review-and-defensive-bloodhound-usage/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-09-ad-privilege-path-review-and-defensive-bloodhound-usage/</guid><description>BloodHound isn&apos;t just an attacker tool. Defenders use it to understand which privilege paths exist before an attacker finds them. This article covers how to run BloodHound defensively, interpret the output as a lateral movement risk map, and reduce admin sprawl before year-end freezes make changes harder.</description><pubDate>Thu, 25 Sep 2025 00:00:00 GMT</pubDate></item><item><title>Packet Analysis Case Study: DNS + TLS + HTTP Triage in a Suspect Session</title><link>https://hack3rs.ca/blog/2025-08-packet-analysis-case-study-dns-tls-http-triage/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-08-packet-analysis-case-study-dns-tls-http-triage/</guid><description>Packet analysis is how defenders prove what happened instead of relying on log summaries and assumptions. This walkthrough uses Wireshark and TShark to reconstruct a suspect session: DNS resolution, TLS handshake metadata, HTTP request patterns, and timing anomalies that together tell a coherent story.</description><pubDate>Thu, 14 Aug 2025 00:00:00 GMT</pubDate></item><item><title>Wireless Rogue AP Drills and BYOD Segmentation Validation</title><link>https://hack3rs.ca/blog/2025-07-wireless-rogue-ap-drills-and-byod-segmentation-validation/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-07-wireless-rogue-ap-drills-and-byod-segmentation-validation/</guid><description>Wireless monitoring is easy to deprioritize until a rogue AP appears at a conference room or a BYOD device ends up on the wrong VLAN. This article covers how to run authorized wireless detection drills, validate BYOD and guest segmentation, and correlate RF activity with network-side telemetry during triage.</description><pubDate>Thu, 24 Jul 2025 00:00:00 GMT</pubDate></item><item><title>Zeek and Suricata Tuning for Noisy Environments (Without Losing Signal)</title><link>https://hack3rs.ca/blog/2025-06-zeek-and-suricata-tuning-for-noisy-environments/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-06-zeek-and-suricata-tuning-for-noisy-environments/</guid><description>Alert fatigue is a detection engineering failure, not an analyst failure. This article covers how to tune Zeek and Suricata in a controlled, evidence-based way: baselining traffic, documenting tuning decisions with rationale, reducing false positive volume, and validating that real signals survive the process.</description><pubDate>Wed, 11 Jun 2025 00:00:00 GMT</pubDate></item><item><title>Supply Chain Trust Paths and Vendor Remote Access Oversight for Defenders</title><link>https://hack3rs.ca/blog/2025-05-supply-chain-trust-paths-and-vendor-remote-access-oversight/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-05-supply-chain-trust-paths-and-vendor-remote-access-oversight/</guid><description>Vendor remote access is a category most defenders under-monitor because it&apos;s labeled &apos;trusted.&apos; This article covers how to inventory third-party access paths, what to look for in vendor session logs, how to correlate changes against approved tickets, and how to detect when trusted access is being abused.</description><pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate></item><item><title>ATT&amp;CK Mapping for Lateral Movement Detections That Actually Help Analysts</title><link>https://hack3rs.ca/blog/2025-04-attack-mapping-lateral-movement-detections-that-actually-help/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-04-attack-mapping-lateral-movement-detections-that-actually-help/</guid><description>ATT&amp;CK mapping is only useful if it connects to real telemetry and analyst workflows. This article covers how to map lateral movement detections specifically — what behaviors to focus on, which log sources they depend on, how to identify gaps, and how to make the output useful to analysts during actual triage rather than just filling a coverage matrix.</description><pubDate>Wed, 09 Apr 2025 00:00:00 GMT</pubDate></item><item><title>VPN/RDP Exposure Drift and Remote Access Validation with Nmap + Ndiff</title><link>https://hack3rs.ca/blog/2025-03-vpn-rdp-exposure-drift-and-remote-access-validation/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-03-vpn-rdp-exposure-drift-and-remote-access-validation/</guid><description>Remote access exposure accumulates quietly. A VPN exception added for a contractor, an RDP port opened for a support session, a management interface temporarily broadened — each one might be small, but they compound. This article covers a practical audit workflow for catching that drift before attackers find it first.</description><pubDate>Tue, 18 Mar 2025 00:00:00 GMT</pubDate></item><item><title>Business Email Compromise, Session Theft, and Mailbox Abuse: What Defenders Miss</title><link>https://hack3rs.ca/blog/2025-02-business-email-compromise-session-theft-and-mailbox-abuse/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-02-business-email-compromise-session-theft-and-mailbox-abuse/</guid><description>BEC incidents are often discovered through finance, not security. By the time a fraudulent payment is flagged, the mailbox has been compromised for days. This article covers the credential theft and session abuse chain that enables BEC, the mailbox artifacts defenders should look for, and how to contain and recover before payments get processed.</description><pubDate>Thu, 13 Feb 2025 00:00:00 GMT</pubDate></item><item><title>KEV Prioritization Reset for the New Year: Rebuilding a Patch Queue That Matters</title><link>https://hack3rs.ca/blog/2025-01-kev-prioritization-reset-for-the-new-year/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2025-01-kev-prioritization-reset-for-the-new-year/</guid><description>CVSS-sorted patch queues don&apos;t reflect how attackers prioritize. This article covers how to rebuild a remediation queue using a KEV-informed workflow: asset criticality mapping, exposure context, active exploitation signals, and validation that confirms fixes actually worked — not just that tickets were closed.</description><pubDate>Thu, 16 Jan 2025 00:00:00 GMT</pubDate></item><item><title>Backup Restore Validation and Year-End Response Drills (Before You Need Them)</title><link>https://hack3rs.ca/blog/2024-12-backup-restore-validation-and-year-end-response-drills/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-12-backup-restore-validation-and-year-end-response-drills/</guid><description>A backup you&apos;ve never restored is an assumption. An incident response plan you&apos;ve never drilled is a document. This article is a year-end resilience checklist: validate your backups with real restores, confirm recovery priorities, drill response decisions with reduced staffing, and fix the gaps before an incident finds them.</description><pubDate>Thu, 12 Dec 2024 00:00:00 GMT</pubDate></item><item><title>Holiday Commerce Surface Hardening and Web Telemetry Review</title><link>https://hack3rs.ca/blog/2024-11-holiday-commerce-surface-hardening-and-web-telemetry-review/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-11-holiday-commerce-surface-hardening-and-web-telemetry-review/</guid><description>High-traffic seasons are when web-facing systems face the most load and the least scrutiny. This article covers how to harden web exposure before traffic peaks: reviewing exposed paths, validating app hardening, monitoring error logs for probe patterns, and tying findings to remediation and alerting workflows.</description><pubDate>Thu, 21 Nov 2024 00:00:00 GMT</pubDate></item><item><title>Phishing-Resistant MFA and Identity Hardening: Building Better Defaults</title><link>https://hack3rs.ca/blog/2024-10-phishing-resistant-mfa-and-identity-hardening-month/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-10-phishing-resistant-mfa-and-identity-hardening-month/</guid><description>Most security awareness content tells users not to click links. This article focuses on what actually reduces identity risk: stronger MFA methods, session hygiene, conditional access, and teaching users what real sign-in prompts look like so they can recognize when something is wrong.</description><pubDate>Thu, 10 Oct 2024 00:00:00 GMT</pubDate></item><item><title>Segmentation and DDoS Readiness for High-Traffic Seasons</title><link>https://hack3rs.ca/blog/2024-09-segmentation-and-ddos-readiness-for-high-traffic-seasons/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-09-segmentation-and-ddos-readiness-for-high-traffic-seasons/</guid><description>DDoS readiness is less about tools and more about decisions made in advance. This guide covers traffic characterization, dependency mapping, segmentation validation, runbook preparation, and what defenders actually need to know before an availability incident forces improvisation.</description><pubDate>Tue, 17 Sep 2024 00:00:00 GMT</pubDate></item><item><title>DNS Anomaly Hunting for Quiet Command-and-Control Activity</title><link>https://hack3rs.ca/blog/2024-08-dns-anomaly-hunting-for-quiet-command-and-control/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-08-dns-anomaly-hunting-for-quiet-command-and-control/</guid><description>DNS C2 activity is quiet by design. This article covers how to baseline DNS query behavior, recognize tunneling-like patterns in query names and timing, validate suspicious domains with packet inspection, and use Zeek and TShark to build a detection workflow that doesn&apos;t drown analysts in false positives.</description><pubDate>Thu, 08 Aug 2024 00:00:00 GMT</pubDate></item><item><title>Public Wi-Fi During Travel Season: VPN Use, Wireless Trust, and Defensive Habits</title><link>https://hack3rs.ca/blog/2024-07-public-wifi-travel-season-vpn-and-wireless-defense-basics/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-07-public-wifi-travel-season-vpn-and-wireless-defense-basics/</guid><description>Travel-season wireless risk is real but often overstated in fear-driven ways that don&apos;t change behavior. This article takes a practical approach: what actually happens on untrusted Wi-Fi, how evil twin scenarios work, what VPN hygiene looks like in practice, and how to give users concrete guidance that sticks.</description><pubDate>Fri, 19 Jul 2024 00:00:00 GMT</pubDate></item><item><title>Cloud Identity Drift and Control-Plane Visibility: Catching Risk Before Breach</title><link>https://hack3rs.ca/blog/2024-06-cloud-identity-drift-and-control-plane-visibility/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-06-cloud-identity-drift-and-control-plane-visibility/</guid><description>Cloud IAM drift is how over-permissioned roles and stale access keys accumulate until an attacker finds them. This guide covers control-plane log analysis, IAM privilege scope review, and how to triage suspicious admin actions in cloud environments before they become breaches.</description><pubDate>Thu, 06 Jun 2024 00:00:00 GMT</pubDate></item><item><title>Ransomware Pre-Positioning Signals: What to Catch Before Encryption Starts</title><link>https://hack3rs.ca/blog/2024-05-ransomware-pre-positioning-signals-before-encryption/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-05-ransomware-pre-positioning-signals-before-encryption/</guid><description>Ransomware operators spend days or weeks inside an environment before triggering encryption. This article focuses on the detection opportunities that exist during pre-impact staging — lateral movement, backup tampering, credential abuse, and security-tool interference — and how to build coverage for those behaviors before the louder events arrive.</description><pubDate>Tue, 14 May 2024 00:00:00 GMT</pubDate></item><item><title>Internet-Facing Edge Audit and KEV Prioritization Before Change Windows</title><link>https://hack3rs.ca/blog/2024-04-internet-facing-edge-audit-and-kev-prioritization/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-04-internet-facing-edge-audit-and-kev-prioritization/</guid><description>How to run a defender-grade edge audit: inventory exposed services, compare scan drift, prioritize by exploited vulnerabilities rather than severity scores alone, and validate remediation with direct testing rather than ticket status.</description><pubDate>Tue, 23 Apr 2024 00:00:00 GMT</pubDate></item><item><title>Tax Season Phishing and Credential Harvesting: A Defender Playbook</title><link>https://hack3rs.ca/blog/2024-03-tax-season-phishing-and-credential-harvesting-defense/</link><guid isPermaLink="true">https://hack3rs.ca/blog/2024-03-tax-season-phishing-and-credential-harvesting-defense/</guid><description>Tax season is a reliable phishing window. Finance teams are under deadline pressure, invoices move fast, and a spoofed email from HR or payroll doesn&apos;t raise immediate flags. This playbook covers what attackers do during the March window, how to detect early signals in auth and email logs, how to triage compromised accounts without destroying evidence, and how to reduce repeat incidents through faster reporting and better identity controls.</description><pubDate>Mon, 11 Mar 2024 00:00:00 GMT</pubDate></item></channel></rss>