CyberNexusBlog

    CyberNexusBlog

    Tag

    #cybersecurity-1

    Cover Image for Eureka HTB - Complete Walkthrough: Exploiting Spring Cloud Eureka Service Registry

    Eureka HTB - Complete Walkthrough: Exploiting Spring Cloud Eureka Service Registry

    Introduction Eureka is a fascinating HackTheBox machine that demonstrates real-world vulnerabilities in Spring Cloud microservices architect…

    Sep 3, 2025
    Cover Image for Cap HTB Walkthrough - Exploiting IDOR and PwnKit

    Cap HTB Walkthrough - Exploiting IDOR and PwnKit

    Introduction Cap is an easy-difficulty Linux machine from HackTheBox that demonstrates the importance of proper access controls and keeping …

    Sep 1, 2025
    Cover Image for Building a Comprehensive Open Source SIEM Solution

    Building a Comprehensive Open Source SIEM Solution

    Introduction In today's cybersecurity landscape, having a robust Security Information and Event Management (SIEM) system is crucial for orga…

    Jan 30, 2025
    Cover Image for Steps to Integrate Wazuh, TheHive, and Shuffle in a SOC Automation Lab

    Steps to Integrate Wazuh, TheHive, and Shuffle in a SOC Automation Lab

    Introduction In this post, I'll walk you through building a comprehensive Security Operations Center (SOC) automation lab that integrates Wa…

    Jan 28, 2025
    CyberNexus

    Stay in touch

    • Contact us
    • Book a demo
    • Newsletter
    • Slack

    Resources

    • Community
    • Use Cases
    • Source Code
    • Blog

    Product

    • Pricing
    • Documentation
    • Integrations
    • Support

    Other links

    • Events
    • Careers
    • Newsroom
    • About us

    © 2023 Company Inc.

    Privacy Policy · Terms