Checklist: Essential Steps After Purchasing a Virtual Linux Server

Date: 02/08/2025

A virtual server is suitable for handling a wide range of tasks, especially since renting one is quite affordable. If you’re using a VDS, be sure to check out this small checklist to go through after purchasing a virtual server. Ignoring these simple rules can create a serious security vulnerability in your system. The article focuses on setting up a VDS using Ubuntu as an example, but the instructions should work for most modern distributions.
Read full article →


Enhancing Event Auditing in Windows with Sysmon for Security Experts

Date: 25/07/2025

Technical specialists who have attempted to find truly important information in the logs of Microsoft Windows operating systems while investigating cybersecurity incidents or troubleshooting know that important details often don’t make it into the event audit logs. Is it possible to fix this situation without additional financial investment using tools that are guaranteed to be compatible with the Windows environment? Of course, it is!
Read full article →


Setting Up the ELK Stack: Configuring Elasticsearch, Logstash, and Kibana for Log Collection and Analysis on Servers

Date: 11/07/2025

Service and application logs are often one of the few tools available to identify the source of issues. However, they are typically forgotten after installation and debugging. Modern approaches to development, deployment, and application maintenance demand a different mindset—one where you can quickly locate necessary information. Centralized log collection and analysis systems are invaluable in this regard. Today, we will explore how to configure the popular ELK stack.
Read full article →


Dangerous developments: An overview of vulnerabilities in coding services

Date: 09/02/2022

Development and workflow management tools represent an entire class of programs whose vulnerabilities and misconfigs can turn into a real trouble for a company using such software. For a pentester, knowledge of these bugs is a way to successful exploitation; while for an admin, it’s a great opportunity to enhance the protection. This article discusses vulnerabilities discovered in Jira, Confluence, Asana, Docker, GitLab, and other similar products.
Read full article →