Skip to content
HiveSecurity
  • Home
  • Blog
  • Tags
  • Vulnerabilities
    • Tools
    • Cheat Sheet
    • Security Guides
  • Contact
  • About
Esc
Type to search...
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Resources
  • Tools
  • Cheat Sheet
  • Security Guides
  • Contact
  • About
← All tags Tag

Blue Team

68 articles

Wireshark for Threat Detection: A Practical Guide for 2026

How to find real threats with Wireshark in 2026 — encrypted traffic analysis, JA3 fingerprinting, ransomware patterns, C2 beaconing, and DNS tunneling explained step by step.

6 May 2026
Blue Team Network Security Wireshark

Cobalt Strike Detection & Hunting: A Defender's Playbook

How to detect Cobalt Strike beacons in your environment — network fingerprints, process injection patterns, Sigma rules, and practical hunting queries for blue teams.

4 May 2026
Blue Team Cobalt Strike Threat Hunting

UEFI Bootkits: The Malware That Lives Below Your Operating System

UEFI bootkits survive OS reinstalls, hide from every AV and EDR tool, and can bypass Secure Boot on fully-patched systems. Here's how they work and what you can do about it.

1 May 2026
Malware Analysis Firmware Security Threat Intelligence

AWS IAM Privilege Escalation to Data Exfil: The Full Attack Chain

How attackers escalate from a low-privilege AWS IAM credential to full S3 data theft — and the CloudTrail events, GuardDuty findings, and Sigma rules that expose them.

30 April 2026
Cloud Security Red Team Blue Team

macOS Offensive Security: How Attackers Exploit Apple's Unique Attack Surface

TCC bypass, Keychain theft, Launch Agent persistence, dylib hijacking — how attackers target macOS and how defenders detect them. Attack→Detect with real commands.

30 April 2026
Red Team Blue Team Detection

Memory Forensics with Volatility 3: What Attackers Leave Behind

How attackers hide in RAM using fileless malware and process injection — and how defenders use Volatility 3 to find them. Practical DFIR workflow with real commands.

30 April 2026
Malware Analysis Blue Team Detection

Linux Lateral Movement: Attack Techniques and How to Detect Them

A complete guide to Linux lateral movement — SSH pivoting, ssh-agent hijacking, credential harvesting, port forwarding, and NFS abuse. Includes auditd rules, Sigma, Wazuh, and Sentinel KQL detections.

29 April 2026
Linux Red Team Blue Team

MITRE ATT&CK v19: Defense Evasion Is Dead — Meet Stealth and Impair Defenses

ATT&CK v19 drops April 28 and splits Defense Evasion into two tactics. Here's what changes, why it matters for detection engineering, and what you need to do before the weekend.

26 April 2026
MITRE ATT&CK Detection Blue Team

AutoHotkey Malware Loaders: How Attackers Weaponize Automation Scripts

AutoHotkey isn't just for productivity scripts — attackers use it as a stealthy malware loader. Learn how AHK-based campaigns work and how to detect them.

25 April 2026
Malware Analysis Detection Red Team

Linux Privilege Escalation: Attack Techniques and How to Detect Them

A complete guide to Linux privilege escalation — SUID abuse, sudo misconfig, cron hijacking, capabilities, and kernel exploits. Includes auditd rules, Sigma, Wazuh, and Sentinel KQL detections.

24 April 2026
Linux Red Team Blue Team

The EDR Dead Zone: How Attackers Pivot Through Cameras and NAS Devices

IoT devices like IP cameras and NAS boxes sit on your network but outside your EDR coverage. Here's how attackers exploit them to pivot — and how defenders can detect it.

22 April 2026
Cybersecurity Red Team Blue Team

Claude Mythos: The AI That Rewrites the Rules of Cybersecurity — For Everyone

Anthropic built an AI that autonomously discovered a 27-year-old vulnerability in widely-used code. It can build working exploits from scratch. It's too dangerous to release publicly. Here's what that means for your bank, your government, your code — and the future of digital security.

21 April 2026
AI Security Cybersecurity Vulnerability Research

NTLM Relay in 2026: Microsoft Declared It Dead. Attackers Didn't Get the Memo.

Microsoft is officially deprecating NTLM — yet CVE-2025-24054 was actively exploited days after patching, and the Coercion → Relay → ADCS → Domain Admin chain still works in most enterprise environments. Here's the full 2026 kill chain and how to detect it.

21 April 2026
Active Directory Red Team Blue Team

Prompt Injection in 2026: From Research Toy to Real CVEs, Agent Hijacking, and Zero-Click Exfiltration

CVE-2025-32711 (EchoLeak) exfiltrated M365 data with zero user interaction. The Anthropic MCP server had three exploitable injection CVEs. OpenAI says AI browsers may never be fully fixed. Here's the full attack chain — and how to detect it.

21 April 2026
AI Security Red Team Blue Team

DCSync: How Attackers Steal Every Password in Your Domain — and How to Stop Them

DCSync abuses Active Directory replication to pull every password hash from a domain controller without touching it. Here's how the attack works, what it leaves in your logs, and how to build detections that catch it.

18 April 2026
Active Directory Red Team Blue Team

Pass-the-Hash & Pass-the-Ticket: How Attackers Move Laterally — and How to Catch Them

A practitioner's guide to PtH and PtT attacks: how they work, what tools attackers use, what evidence they leave behind, and how to build detections with Sigma and Wazuh.

18 April 2026
Active Directory Red Team Blue Team

When Your Defender Becomes the Attacker: How Trusted Windows Processes Get Weaponized

Windows Defender and other high-privilege system processes are increasingly targeted by attackers. Learn how security tools become attack surfaces — and what you can do about it.

17 April 2026
Windows Security Privilege Escalation Cybersecurity

zipguard: Safe ZIP Extraction With Zero Dependencies

ZIP archives are a common malware delivery vector. zipguard is a zero-dependency Python CLI that blocks ZipSlip, archive bombs, executable drops, and ZIP64 manipulation before anything hits disk.

16 April 2026
Tools Supply Chain Blue Team

From CVE to RCE in Hours: The Collapse of the Exploitation Window

The average time from vulnerability disclosure to active exploitation has collapsed from 756 days in 2018 to mere hours in 2025. Here's what that means for defenders.

14 April 2026
Vulnerability Management Blue Team Threat Intelligence

Vulnerability Exploitation Overtook Phishing — What That Means for Defenders

For the first time, vulnerability exploitation is the #1 initial access vector — not phishing. Here's what the data says and how defenders must adapt.

14 April 2026
Blue Team Vulnerability Management Detection

Attack to Defend: Why the Best Security Professionals Think on Both Sides

The most dangerous defenders understand how attackers think. The best red teamers understand what defenders see. Here's why the divide between offense and defense is killing your security program.

13 April 2026
Red Team Blue Team Cybersecurity

SQL Injection in 2026: The Complete Attack and Defense Guide

SQL injection has existed since 1998 and still powers major breaches in 2026. A complete guide covering every attack type, real exploitation techniques, detection logic, and how to actually fix it.

13 April 2026
Web Security Red Team Blue Team

Rapid Compromise Triage: First 10 Minutes on Linux and Windows

A practical workflow for the first 10 minutes after a suspected breach — commands with explanations for Linux and Windows triage, red flags, and when to escalate.

11 April 2026
Incident Response Blue Team DFIR

Xanthorox AI: When the Attacker's AI Goes Dark

Xanthorox is an offline, modular AI attack platform with five specialized models — and it needs no cloud, no API, and leaves no traditional IoCs. Here's what defenders need to know.

10 April 2026
Cybersecurity Malware Analysis AI Security

AI Agent Traps: Six Ways Attackers Manipulate Autonomous AI — With Real Examples

Google DeepMind published the first systematic taxonomy of AI agent manipulation techniques. Here's what each attack looks like in practice — and why most AI deployments are already vulnerable.

9 April 2026
AI Security Cybersecurity Red Team

Browser-in-the-Browser: The Phishing Attack That Fakes the Browser Itself

Browser-in-the-Browser (BitB) attacks forge convincing browser popup windows using pure HTML and CSS — making phishing pages nearly impossible to spot by eye. Here's how it works and how to defend against it.

9 April 2026
Phishing Web Security Red Team

SSRF Explained: How Attackers Make Servers Fetch Secrets for Them

Server-Side Request Forgery (SSRF) lets attackers trick a server into making requests on their behalf — reaching internal systems, cloud credentials, and more.

9 April 2026
Web Security Red Team Blue Team

XSS Explained: How Attackers Inject Code Into Your Browser

Cross-Site Scripting (XSS) lets attackers inject malicious JavaScript into web pages viewed by other users — stealing sessions, redirecting victims, and taking over accounts.

9 April 2026
Web Security Red Team Blue Team

Active Directory Attacks: The Complete Attack Path Guide

A structured guide to Active Directory attack techniques — from BloodHound enumeration through Kerberoasting, LSASS dumping, ADCS abuse, and Shadow Credentials to Entra ID pivot. Every technique with detection coverage.

8 April 2026
Active Directory Red Team Blue Team

API Security in 2026: JWT Attacks, OAuth Abuse, and GraphQL Exploitation

APIs are the most exploited attack surface in 2026. Learn how attackers abuse JWT tokens, OAuth flows, and GraphQL endpoints — and how to stop them.

8 April 2026
Web Security Red Team Blue Team

DFIR in 2026: A Complete Guide to Digital Forensics and Incident Response

From initial alert to post-incident report — a professional walkthrough of DFIR methodology, evidence collection, memory forensics, Windows artifacts, and response playbooks.

8 April 2026
Blue Team Incident Response Digital Forensics

Kubernetes and Container Security: Attacks, Misconfigurations, and Defenses

How attackers break out of containers, escalate privileges in Kubernetes clusters, and move into cloud infrastructure — and how defenders detect and stop them.

8 April 2026
Cybersecurity Red Team Blue Team

Modern Windows Attack Techniques in 2026: Evasion, Delivery, and Stealth

A structured guide to modern Windows attack techniques — BYOVD EDR evasion, LOLBins, invisible character injection, ClickFix delivery, NTFS steganography, and C2 over trusted cloud services. How they work, how to detect them.

8 April 2026
Red Team Blue Team Malware Analysis

Python Security: What Can Go Wrong When You Code and When You Download

Python's flexibility is also its attack surface. A practical guide to the security risks that catch developers off guard — from virtual environment isolation and PyPI typosquatting to eval() injection, pickle deserialization, and hardcoded secrets.

8 April 2026
Cybersecurity Blue Team Supply Chain

BYOVD: How Attackers Use Legitimate Drivers to Kill Your Security Tools

BYOVD (Bring Your Own Vulnerable Driver) lets attackers reach the Windows kernel using signed, legitimate drivers — and then silently kill your EDR before ransomware drops.

6 April 2026
Red Team Blue Team Malware Analysis

Cookie-Controlled PHP Webshells: A Stealthy Tradecraft in Linux Hosting Environments

Microsoft's Defender team uncovered a clever attacker technique: PHP webshells that stay completely dormant until activated by a secret HTTP cookie. Here's how it works — and how to catch it.

4 April 2026
Web Security Red Team Blue Team

We Built a Supply Chain Scanner — Here's What We Learned

Gate is an open-source Python CLI that catches what Trivy and Snyk miss: newly published packages, suspicious install scripts, and maintainer takeovers. Zero dependencies by design.

4 April 2026
Cybersecurity Supply Chain Blue Team

The Package You Trusted: How the Axios Supply Chain Attack Happened

On March 31, 2026, a trusted npm package with 400 million monthly downloads was backdoored for three hours. Here's how it worked and why it keeps happening.

1 April 2026
Cybersecurity Supply Chain Malware Analysis

When Trusted Agents Turn Rogue: The Rise of the Double Agent in Modern AI Systems

AI agents are trusted to act on your behalf — but that trust is exactly what attackers exploit. Here's how AI agents get turned against you, and why you won't see it coming.

1 April 2026
AI Security Cybersecurity Red Team

Cybersecurity Careers: What the Job Actually Looks Like (Not the Movie Version)

A realistic guide to cybersecurity career paths in 2026 — from SOC analyst to GRC, threat intel, AppSec, cloud security, and DFIR. What each role actually does every day.

28 March 2026
Cybersecurity Career Blue Team

Trust Me, I'm a Shortcut: How LNK Files Lie to Windows Explorer

Windows .lnk shortcut files can show one target while silently executing another. Discover five spoofing techniques including CVE-2025-9491, how attackers exploit them, and how to detect them.

27 March 2026
Red Team Blue Team Windows Security

NTFS Alternate Data Streams: How Attackers Hide in Plain Sight

NTFS Alternate Data Streams let attackers hide executables inside innocent-looking files. Learn how ADS works, how malware uses it, and how to detect it with PowerShell, Sysinternals, and Sysmon.

27 March 2026
Red Team Blue Team Windows Security

Shadow Credentials: Account Takeover Without a Password

Shadow Credentials abuse msDS-KeyCredentialLink via DACL misconfiguration to add a rogue certificate, authenticate via PKINIT, and extract NT hashes — no password required.

27 March 2026
Active Directory Red Team Blue Team

AitM Phishing: How Attackers Bypass MFA and How to Stop Them

Adversary-in-the-Middle phishing silently proxies real login pages and steals session tokens — making MFA useless. Here's how it works and how to detect it.

26 March 2026
Phishing Red Team Blue Team

Canary Tokens: Free Tripwires That Catch Attackers in the Act

Canary tokens are digital tripwires that alert you the moment an attacker touches something they shouldn't. Free, no-install, and zero false positives.

26 March 2026
Blue Team Detection Threat Hunting

Non-Human Identities: The Attack Surface Your Security Team Isn't Managing

Service accounts, API keys, OAuth tokens and machine credentials now outnumber human identities 144 to 1. Most organizations have zero visibility into them. Attackers do.

24 March 2026
Cybersecurity Identity Security Blue Team

Why Enterprise VPN and Gateway Products Are Perpetually Broken

Ivanti, Fortinet, Palo Alto — the names change but the pattern doesn't. Here's the structural reason why enterprise edge devices are permanently on fire and what you can do about it.

24 March 2026
Cybersecurity Red Team Blue Team

Telegram as a C2 Server: How It Works and How to Detect It

Attackers use Telegram's Bot API as command-and-control infrastructure — no Telegram install needed on the victim machine. Here's the mechanics, real-world examples, and blue team detection strategies.

23 March 2026
Cybersecurity Blue Team Malware Analysis

ADCS Abuse with Certipy: From Low-Priv User to Domain Admin via Certificate Services

Active Directory Certificate Services is installed in most enterprise networks — and almost always misconfigured. Here's how attackers exploit ESC1 through ESC8 with Certipy, and how to detect and stop them.

21 March 2026
Active Directory Red Team Blue Team

LOLBins in 2026: How Attackers Use Windows Against Itself

79% of attacks in 2024 used no malware at all. Attackers abuse Windows' own built-in tools — certutil, mshta, rundll32 — to execute code and evade detection. Here's the full attack playbook and how to detect it.

21 March 2026
Red Team Blue Team Detection

The Linux Server Attack Surface You Didn't Install: Default Services That Open Your System

Every major Linux distro ships services you never asked for. From snapd to CUPS to rpcbind — a practical audit guide covering Ubuntu, Debian, RHEL, Rocky, Fedora, and openSUSE.

18 March 2026
Hardening Blue Team Linux

Windows Event Logs for Security Analysts: Read, Hunt, Automate

A practical guide to Windows Event Log analysis for blue teams — key Event IDs, PowerShell automation, cross-version differences, and structured exports for SIEM tools.

18 March 2026
Blue Team Detection Windows

Entra ID Attacks in Practice: Device Code Phishing, PRT Theft, and Conditional Access Bypass

MFA is no longer enough to protect Microsoft Entra ID accounts. Attackers steal tokens, register their own devices, and bypass Conditional Access — without ever touching a password. Here's the full attack chain and how to detect it.

17 March 2026
Cloud Security Red Team Blue Team

Salt Typhoon: How China Hacked the World's Largest Telecoms

Salt Typhoon is the worst telecom breach in history. The Chinese APT stayed hidden for years inside AT&T, Verizon and T-Mobile. Here's the full attack chain, the tools they used, and the detection opportunities blue teams missed.

17 March 2026
Threat Intelligence Red Team Blue Team

Phishing Under the Microscope: Analyzing a Real Attack Email Step by Step

We tear apart a realistic phishing email using Security Decoder — headers, URLs, JWT tokens, and obfuscated JavaScript — and show exactly what each red flag means.

15 March 2026
Cybersecurity Phishing Blue Team

CrackArmor: Nine AppArmor Flaws That Let Attackers Own the Kernel

Qualys TRU disclosed nine confused deputy vulnerabilities in Linux AppArmor — exposing 12.6 million servers to root escalation, KASLR bypass, and container isolation collapse. Technical deep dive and detection guide.

13 March 2026
Linux Kernel Security Red Team

Post-Quantum Cryptography: Prepare Before Your Encryption Breaks

Quantum computers will crack today's encryption — and attackers are already stealing encrypted data to decrypt later. Here's what post-quantum cryptography means for everyone.

23 February 2026
Cybersecurity Cryptography Privacy

Starkiller: Inside Empire's C2 GUI — Red Team Playbook and Blue Team Detection

A technical deep dive into Starkiller and PowerShell Empire — how red teams deploy and operate it, and exactly how defenders can detect and disrupt it.

21 February 2026
Blue Team Cybersecurity Lateral Movement

AD Attack Chains: From Initial Access to Domain Admin

A complete purple team walkthrough of Active Directory attack chains — from initial foothold through Kerberoasting, DCSync, and Golden Tickets to full domain compromise, with detection rules for every technique.

16 February 2026
Active Directory Blue Team Cybersecurity

What 218 Million Honeypot Events Reveal About January 2026

Global honeypot sensors logged over 218 million malicious events in January 2026. MSSQL attacks doubled, botnet infrastructure expanded 50%, and attackers pivoted away from RDP toward database targeting.

14 February 2026
Cybersecurity Network Security Threat Intelligence

Purple Teaming on a Budget: Free Tools and Frameworks That Actually Work

A practical guide to building a purple team program using only free, open-source tools. Covers Atomic Red Team, MITRE Caldera, Sigma rules, Wazuh, and VECTR with real setup examples.

14 February 2026
Blue Team Cybersecurity MITRE ATT&CK

PathSentry: Detecting and Preventing Windows PATH Hijacking Attacks

Windows PATH hijacking enables attackers to execute malicious code through writable directories. PathSentry uses two-phase detection to identify vulnerable PATH entries before exploitation.

4 February 2026
Blue Team Cybersecurity Endpoint Security

Threat Hunting with Wazuh: Building Effective Detection Rules

A practical guide to writing custom Wazuh detection rules for threat hunting — covering rule anatomy, decoder chaining, MITRE ATT&CK mapping, and real-world detection scenarios for enterprise environments.

28 January 2026
Wazuh SIEM Blue Team

Client-Side File Analysis with Directory Tool Pro

A Chrome extension for local file scanning and secrets detection. No cloud uploads, instant analysis, useful for security audits and pentesting workflows.

19 January 2026
Cybersecurity Red Team Web Security

GitHub Secrets Management Crisis: 65% of AI Companies Leaked Credentials

65% of Forbes AI 50 companies leaked secrets on GitHub with 94-day median remediation time. Blue team guide to detect, prevent, and respond to repository leaks.

13 January 2026
Cybersecurity DevSecOps Supply Chain

The Human Remains the Weakest Link – But Now It's AI-Assisted

AI has transformed social engineering into an automated, scalable threat. Learn how attackers leverage AI-powered phishing, deepfakes, and voice cloning—and what defenders can do about it.

27 December 2025
AI Security Social Engineering Threat Intelligence

What It Really Takes to Become a True SOC Professional

Discover the real skills, mindset, and strategies needed to become a genuine SOC professional—from technical mastery to standing out in job hunts.

23 December 2025
Blue Team Incident Response SIEM

Why Changing Your DNS Is One of the Best Privacy Decisions You'll Make

Your ISP tracks every website you visit through DNS. Learn why changing to privacy-focused DNS providers like Mullvad, Quad9, or DNS4EU is essential for online privacy.

15 December 2025
Network Security Privacy Cybersecurity
HiveSecurity

Offensive thinking. Defensive expertise.

Content
  • Home
  • Blog
  • Tags
  • Vulnerabilities
Resources
  • Tools
  • Cheat Sheet
  • Security Guides
Company
  • Contact
  • About
  • RSS
  • Privacy

© 2026 Hive Security. All rights reserved.

Built with zero trust & least privilege