Basics of cybersecurity

  •   Strengthening password security
    Episode 1

    Strengthening password security

    Passwords are like toothbrushes—don’t share them, change them often, and don’t reuse the old ones.

  •   Wi-Fi security best practices
    Episode 2

    Wi-Fi security best practices

    Free Wi-Fi is never truly free—pay with your data if you’re not protected. VPN up and watch your back.

  •   Windows defender: is it boosting your security?
    Episode 3

    Windows defender: is it boosting your security?

    Don’t judge a tool by its factory default—Defender can pack a punch if you sharpen it right.

  •   Web browser security
    Episode 4

    Web browser security

    Blocking JavaScript isn’t the answer—tame the chaos with the right browser bodyguards.

  •   3 GPO factors to identify under 30 seconds
    Episode 5

    3 critical GPO issues you can spot in under 30 seconds

    Got half a minute? That’s all you need to spot weak links in your Group Policy fortress.

  •   Exploiting Windows services for privilege escalation
    Episode 6

    Exploiting Windows services for privilege escalation

    Can one writable Windows service give an attacker elevated privileges and more?

  •   Abusing client-side MFA
    Episode 7

    Abusing client-side MFA

    Watch out for the client-side MFA component to be abused, as MFA bypass is easier than you think.

Threat, malware, and cyberattacks

  •   Does a blue screen of death indicate a cyberattack?
    Episode 1

    Does a blue screen of death indicate a cyberattack?

    That crash isn’t just chaos. It could be your system pulling the emergency brake on a cyber intruder.

  •   Emerging threats- BumbleBee malware
    Episode 2

    Emerging threats- BumbleBee malware

    This bee doesn’t buzz—it breaches. Spot BumbleBee before it swarms your systems with ransomware.

  •   Windows Malicious Software Removal Tool
    Episode 3

    Windows Malicious Software Removal Tool

    That random PowerShell pop-up? Could be a malware whisper—use MRT to speak its language and strike back.

  •   How everyone's a victim of open-source code bases
    Episode 4

    How everyone's a victim of open-source code bases

    Scan, tap, oops! That QR code or library might’ve just invited malware to dinner—trust but verify.

  •   Can one bad browser extension take your organization down?
    Episode 5

    Can one bad browser extension take your organization down?

    Not every extension is an upgrade—some are just malware wearing a helpful little badge.

  •   Weaponizing PowerShell
    Episode 6

    Weaponizing PowerShell

    A few crafty commands, and voilà—an attacker has SYSTEM powers. PowerShell is powerful and dangerous.

  •   Weaponizing PowerShell- Part 2
    Episode 7

    Weaponizing PowerShell- Part 2

    PowerShell can further open up into an attacker's paradise as it could be the one-stop shop for meddling with most defenses.

Cloud attacks and prevention

  •   Securing Azure AD from consent grant attacks
    Episode 1

    Securing Azure AD from consent grant attacks

    Legit app on the outside, malicious intent on the inside—don’t let your users sign the villain’s permission slip.

  •   Fixing an Azure misconfiguration
    Episode 2

    Fixing an Azure misconfiguration

    Your cloud's not leaking rain—it’s leaking risk. Audit now, before the damage goes viral.

And that's how we do it

  •   Naming conventions you must avoid in Active Directory
    Episode 1

    Naming conventions you must avoid in Active Directory

    “Folder123” won’t cut it—poor naming is like breadcrumbs for attackers. Clean it up.

  •   Understanding Windows Encrypting File System (EFS)
    Episode 2

    Understanding Windows Encrypting File System (EFS)

    Encryption that protects—or locks you out forever. Know EFS before it bites back.

  •   Windows System Stability
    Episode 3

    Windows System Stability

    One rogue admin, one tampered folder, and your system could fall like a house of cards.

  •   Enumerating Windows Sticky Keys
    Episode 4

    Enumerating Windows Sticky Keys

    Five taps of Shift shouldn’t open a hacker’s backdoor—Sticky Keys can be stickier than you think.

  •   Event log accumulation across multiple DCs
    Episode 5

    Event log accumulation across multiple DCs using Event Viewer

    Your DCs are talking. Are you listening? Collect event logs like a detective hunting digital clues.

×