Basics of cybersecurity
-
Strengthening password securityEpisode 1
Strengthening password security
Passwords are like toothbrushes—don’t share them, change them often, and don’t reuse the old ones.
-
Wi-Fi security best practicesEpisode 2
Wi-Fi security best practices
Free Wi-Fi is never truly free—pay with your data if you’re not protected. VPN up and watch your back.
-
Windows defender: is it boosting your security?Episode 3
Windows defender: is it boosting your security?
Don’t judge a tool by its factory default—Defender can pack a punch if you sharpen it right.
-
Web browser securityEpisode 4
Web browser security
Blocking JavaScript isn’t the answer—tame the chaos with the right browser bodyguards.
-
3 GPO factors to identify under 30 secondsEpisode 5
3 critical GPO issues you can spot in under 30 seconds
Got half a minute? That’s all you need to spot weak links in your Group Policy fortress.
-
Exploiting Windows services for privilege escalationEpisode 6
Exploiting Windows services for privilege escalation
Can one writable Windows service give an attacker elevated privileges and more?
-
Abusing client-side MFAEpisode 7
Abusing client-side MFA
Watch out for the client-side MFA component to be abused, as MFA bypass is easier than you think.
Threat, malware, and cyberattacks
-
Does a blue screen of death indicate a cyberattack?Episode 1
Does a blue screen of death indicate a cyberattack?
That crash isn’t just chaos. It could be your system pulling the emergency brake on a cyber intruder.
-
Emerging threats- BumbleBee malwareEpisode 2
Emerging threats- BumbleBee malware
This bee doesn’t buzz—it breaches. Spot BumbleBee before it swarms your systems with ransomware.
-
Windows Malicious Software Removal ToolEpisode 3
Windows Malicious Software Removal Tool
That random PowerShell pop-up? Could be a malware whisper—use MRT to speak its language and strike back.
-
How everyone's a victim of open-source code basesEpisode 4
How everyone's a victim of open-source code bases
Scan, tap, oops! That QR code or library might’ve just invited malware to dinner—trust but verify.
-
Can one bad browser extension take your organization down?Episode 5
Can one bad browser extension take your organization down?
Not every extension is an upgrade—some are just malware wearing a helpful little badge.
-
Weaponizing PowerShellEpisode 6
Weaponizing PowerShell
A few crafty commands, and voilà—an attacker has SYSTEM powers. PowerShell is powerful and dangerous.
-
Weaponizing PowerShell- Part 2Episode 7
Weaponizing PowerShell- Part 2
PowerShell can further open up into an attacker's paradise as it could be the one-stop shop for meddling with most defenses.
Cloud attacks and prevention
-
Securing Azure AD from consent grant attacksEpisode 1
Securing Azure AD from consent grant attacks
Legit app on the outside, malicious intent on the inside—don’t let your users sign the villain’s permission slip.
-
Fixing an Azure misconfigurationEpisode 2
Fixing an Azure misconfiguration
Your cloud's not leaking rain—it’s leaking risk. Audit now, before the damage goes viral.
And that's how we do it
-
Naming conventions you must avoid in Active DirectoryEpisode 1
Naming conventions you must avoid in Active Directory
“Folder123” won’t cut it—poor naming is like breadcrumbs for attackers. Clean it up.
-
Understanding Windows Encrypting File System (EFS)Episode 2
Understanding Windows Encrypting File System (EFS)
Encryption that protects—or locks you out forever. Know EFS before it bites back.
-
Windows System StabilityEpisode 3
Windows System Stability
One rogue admin, one tampered folder, and your system could fall like a house of cards.
-
Enumerating Windows Sticky KeysEpisode 4
Enumerating Windows Sticky Keys
Five taps of Shift shouldn’t open a hacker’s backdoor—Sticky Keys can be stickier than you think.
-
Event log accumulation across multiple DCsEpisode 5
Event log accumulation across multiple DCs using Event Viewer
Your DCs are talking. Are you listening? Collect event logs like a detective hunting digital clues.
If you have any questions or feedback, write to shehnaaz.nz@manageengine.com