Author name: My GoGoRRa

Inside a modern Security Operations Center (SOC)

A modern Security Operations Center (SOC) cannot operate in isolation. Its effectiveness relies not only on the technology and analysts it comprises but also on its integration with other organizational areas, particularly with the IT department. Cybersecurity is not a separate layer; it is transversal. It requires a deep understanding of the systems, networks, applications, […]

Inside a modern Security Operations Center (SOC) Read More »

The Power of Nmap: Scanning, Enumeration, and Security Auditing Explained

Nmap is a powerful yet often underestimated network scanning tool. Many know it for basic usage like detecting open ports, but its modular architecture and the depth of its scripting engine (NSE) take it far beyond that: from OS detection and service fingerprinting to light exploitation of known vulnerabilities. Its use spans from internal network

The Power of Nmap: Scanning, Enumeration, and Security Auditing Explained Read More »

Operationalizing CVE Management: Practical Recommendations

Keeping track of CVEs (Common Vulnerabilities and Exposures) relevant to an organization’s infrastructure is neither a passive nor a one-off task. It requires a proactive, systematic strategy aligned with vulnerability management principles established by frameworks such as ISO 27001, NIST CSF, or TISAX. The key is not knowing every CVE, but identifying which ones apply

Operationalizing CVE Management: Practical Recommendations Read More »

CitrixBleed 2: Anatomy of a Critical Breach and a Crucial Test for Enterprise Resilience

On July 10, 2025, the United States Cybersecurity and Infrastructure Security Agency (CISA) designated a critical vulnerability in Citrix NetScaler ADC and Gateway devices as being actively exploited. This was not a routine advisory: CISA issued an unprecedented requirement for all federal agencies to patch the vulnerability within 24 hours. Known as CVE-2025-5777 and already

CitrixBleed 2: Anatomy of a Critical Breach and a Crucial Test for Enterprise Resilience Read More »

How to Start a Career in Cybersecurity (Part 2): Our proposed roadmap

General Cybersecurity Learning Path (Common to All Roles) Phase 1 – Absolute Fundamentals (for non-technical beginners): Phase 2 – Technical Foundations: Phase 3 – Cybersecurity Essentials: Phase 4 – Tools & Standards Intro: Recommended Certifications (ordered by difficulty): Red Team Path – Offensive Security (Ethical Hacking & Exploitation) Beginner Level: Intermediate Level: Advanced Level: Key

How to Start a Career in Cybersecurity (Part 2): Our proposed roadmap Read More »

How to Start a Career in Cybersecurity (Part 1): Roadmap, Specializations, and Skills That Matter

Entering the cybersecurity field does not follow a single, linear path. The current ecosystem is vast and constantly evolving, requiring a flexible, modular, and continuously updated roadmap. It’s not enough to learn techniques or tools: it’s essential to understand the different professional roles, the logic behind each domain, and how they interconnect. This demands a

How to Start a Career in Cybersecurity (Part 1): Roadmap, Specializations, and Skills That Matter Read More »

The 7.3 Tbps DDoS Attack: A Direct Warning to Corporate Cybersecurity Defense Teams

On May 15, 2025, a new record was set in the history of cyberattacks: a distributed denial-of-service (DDoS) attack peaked at 7.3 terabits per second, becoming the largest ever recorded. The scale of this event surpasses all conservative predictions about the evolution of cybercrime and redefines the technical, strategic, and operational requirements that corporate cybersecurity

The 7.3 Tbps DDoS Attack: A Direct Warning to Corporate Cybersecurity Defense Teams Read More »

Security in the OSI Layers: Understanding the Network to Defend It

The OSI model is the conceptual backbone that breaks down the complexity of network communication into seven distinct layers. While real-world environments often rely on the TCP/IP model, OSI remains essential for understanding, classifying, and defending systems against cyberattacks. Each layer represents a specific set of functions but also exposes particular attack vectors and requires

Security in the OSI Layers: Understanding the Network to Defend It Read More »

ITDR: Identity Threat Detection and Response in Hybrid and Multi-Cloud Environments

The perimeter is dead, or rather, it has mutated. In today’s corporate environments, dominated by hybrid architectures, remote users, cloud services, and interconnected applications, digital identity has become the new security perimeter. This idea, once aspirational, is now a reality driven by the most recent and sophisticated attacks. Threat actors no longer compromise endpoints as

ITDR: Identity Threat Detection and Response in Hybrid and Multi-Cloud Environments Read More »

Scroll to Top