cybersecurity
-

AWS : Temporal Proximity – Linking Cloud Security Events Through Time
Weekly #13-2025 – By suktech24, Sun 3 Aug 2025, Estimated reading time : 6 mins As…
-

Amazon S3 SSE-C Ransomware : Part 1
Analyzing Codefinger’s Attack on Amazon S3 server-side encryption with customer-provided keys (SSE-C) Weekly #12-2025 – By…
-

AWS : Threat Detection Rule – GuardDuty detector disabled or suspended
Weekly #11-2025 – By suktech24, Thurs 17 July 2025, Estimated reading time : 10 mins In…
-

Three-Tier Web Application Security Part 1 : Attack Surface
Weekly #10-2025 – By suktech24, Sun 6 July 2025, Estimated reading time : 26 mins This…
-

How to create Threat Detection Use Case 101
Weekly #9-2025 – By suktech24, Fri 27 June 2025, Estimated reading time : 8 mins When…
-

MITRE ATT&CK Navigator
Weekly #8-2025 – By suktech24, Sun 30 March 2025, Estimated reading time : 4 mins In…
-

A Week in Cybersecurity Podcasts and Blogs
Weekly #7-2025 – By suktech24, Sun 23 March 2025, Estimated reading time : 4 mins The…
-

Understanding and Mitigating the ‘Cat Flap’ Technique
Weekly #6-2025 – By suktech24, Tue 17 March 2025, Estimated reading time : 10 mins Last…
-

Detecting Malicious VS Code Extensions 101
Weekly #5-2025 – By suktech24, Sun 9 March 2025, Estimated reading time : 9 mins Visual…
-

Supply Chain Attack : MUT-8694
By suktech24, Sun 2 Feb 2025, Estimated reading time : 7 mins The software supply chain…
