Home
Kyhle Öhlinger
Cancel

Blocking Ads within my Home Network

Over the weekend I was bored and decided to undertake a small project of removing ads from my home network. Initially, I looked into CloudFlare Zero Trust which is free and runs on a serverless arc...

Mapping K8s to MITRE ATT&CK IDs

Last year, Microsoft released the second version of the threat matrix for Kubernetes. Version 2 added new techniques that were found by Microsoft researchers and techniques that were suggested by t...

Cloud Security Conferences

There are tons of conferences at any point in the year and it is sometimes difficult to figure out which are worthwhile attending. This post will hopefully provide you with some of the best confere...

Blue Team Series Part 4: Note Taking and SOC Projects

In the previous post, we looked at SOC fundamentals and escalations. In this post, I will be wrapping up the series with my thoughts on note taking, potential projects that a SOC can undertake and ...

Blue Team Series Part 3: SOC Fundamentals and Escalations

In the previous post, we looked at potential methods for onboarding and training. In this post, I will be discussing some SOC fundamentals, and types of events and escalations that could occur. In...

Site Redesign

It has been a long time coming and I’ve finally completely overhauled the design of this website for the first time since I started the blog using the Flexible Jekyll Theme as shown below: Previo...

Blue Team Series Part 2: SOC Onboarding and Training

In the previous post, we looked at what a Security Operations Center (SOC) is and the basic responsibilities of a SOC analyst. I did mention that I would discuss the meetings that I think help a SO...

Blue Team Series Part 1: What is a SOC?

The first blog post in this series is going to be very short as it aims to cover the basics of what a Security Operations Center (SOC) is and the basic responsibilities of a SOC analyst, which will...