Black Cell blog
Monthly Adversary Tradecraft Spotlight – 2026 March
PowerShell Logging Disabled Via Registry Key Tampering Disabling PowerShell logging is one of the most effective ways to reduce defender visibility during an intrusion. Attackers may inspect registry keys, test execution to see what appears in the event logs, and...
Thriving in IT Security: Zsófia’s Black Cell Story
Why did you choose BlackCell? How did you decide you wanted to work here? I wanted to start my career in IT security in an environment where I could gain insight into multiple aspects of the field while continuously developing my skills. It was important for me to be...
The OT Challenge of NIS2: Why OT Require a Different Security Approach
Introduction Cybersecurity frameworks are often designed with modern IT infrastructures in mind, but industrial systems rarely operate under the same assumptions. As organizations across Europe prepare for NIS2 compliance, many are discovering that traditional...
Black Cell whitepapers
Security Operation Center
Compliance and Audit
