WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
Insights on the Recent Juniper Router Attacks
Sophisticated Threat Actors Targeting Network Infrastructure: UNC3886 and the Juniper Router Attacks Advanced threat actors are...
Leadership CCC 'Character, Competence, Courage' - Commanders Intent
Commander’s Intent: Adapting to Achieve Goals Mike Tyson once said: "Everybody has a plan until they get punched in the mouth." This...
Network Detection Response (NDR) - Sources of Network Evidence and Capture Points
When threat actors compromise a system, they often take steps to evade detection, such as disabling Endpoint Detection and Response (EDR)...
Incident Response - File Analysis
During incident response investigations, a critical task is analyzing files for suspicious behavior. There are multiple levels of...
Leadership CCC 'Character, Competence, Courage' - Key to Character, 'Every Day Habits'
Your habits are building blocks of your character. Strong habits lead to strong character, and strong character creates exceptional leaders.
Leadership CCC 'Character, Competence, Courage' - Character - About Fear and Worry
Embrace each day with courage, as if it were your last, free from fear. Release the grip of death’s shadow by accepting it as life's journey
Leadership CCC 'Character, Competence, Courage' - Thinking Traps
When faced with a challenging situation, pause and ask yourself 3 key questions.
Incident Response - After Action Review (AAR) Template
Highlighting and tracking improvement ideas and tasks derived from the incident using the 5 Why’s model to identify root causes and solution
Leadership CCC 'Character, Competence, Courage' - Focus on Courage
"We must never forget that we may also find meaning in life even when confronted with a hopeless situation" --Viktor Frankyl
Leadership CCC 'Character, Competence, Courage' - Moving Forward under Adversity
“Between stimulus and response there is a space. In that space is our power to choose our response." --Viktor Frankel
Leadership CCC 'Character, Competence, Courage' - Dealing with Stress
A young woman stood before a captivated audience, a glass of water raised in her hand. With a confident smile, she began her lesson on...
Leadership CCC 'Character, Competence, Courage' - Talk the Walk
Confidence is more than just a feeling; it’s a skill—a message to the world that says, “You can trust me because I trust myself.”
Leadership CCC 'Character, Competence, Courage' - Key to Character, 'Understanding Yourself'
The Foundation of Leadership: Understanding Yourself Before exploring the depths of character, you must first confront the most crucial...
Leadership CCC 'Character, Competence, Courage' - A Model for Good Leadership
A leadership mantra I came across years ago encapsulates great leadership in three simple letters: CCC — Character, Competence, Courage
Leadership CCC 'Character, Competence, Courage' - Character 'Red Flags' & Antidotes
Good character is the cornerstone of exceptional leadership.
Leadership CCC 'Character, Competence, Courage' - Dealing with Deceptive Arguments
Language is a powerful tool, but it can also be wielded as a weapon to confuse, manipulate, and control.
Virtualization & CPU usage
A virtual machine (VM) CPU is not a physical, CPU but rather a logical CPU managed by the hypervisor. It represents a part of the real CPU.
Virtualization Monitoring & Incident Response - VMware
Virtualization platforms have become standard in many organizations and have been more commonly been exploited by threat actors.
Incident Response - Linux
Linux Incident Response Approach Overview When conducting incident response on Linux systems, certain types of analysis can be performed quickly and effectively using built-in Linux tools. This initial analysis often provides insights into how the system was compromised and the actions taken during the breach. However, advanced threat actors may employ techniques that complicate the investigation, requiring more time-consuming and sophisticated analysis methods. This Linux an















