Read what HiveNightmare is all about and how to check if your endpoints are vulnerable and how to secure them.
The Intrusus Blog
a cybersecurity story
Nmap is a wonderful tool for enumeration. If you know all the specific flags (the parameters behind the nmap command) and what it can do, it will take over a big role in your cybersecurity career.