The Nextlevel Blog logo
  • About 
  • Research 
  • Tags 
  • Blog 
  1.   Home
  1. Home
  2. Blog

Blog

Efficient Research in Cybersecurity — How AI Tools Streamline CIS Hardening Analysis

June 27, 2025 •9 min read • Ai

Efficient Research in Cybersecurity — How AI Tools Streamline CIS Hardening Analysis

If you’ve ever tried to navigate the depths of CIS benchmarks or other security hardening guides, you know how tedious and fragmented the research process can be. Finding up-to-date, actionable recommendations for each specific setting often means juggling between official documentation, community forums, and best-practice blogs. But there’s a game-changer: AI tools that make research, analysis, and documentation in cybersecurity dramatically more efficient and reliable. ...


Embracing Agile to Foster Self-Organization in Cybersecurity Teams

February 11, 2025 •9 min read • Agile

Embracing Agile to Foster Self-Organization in Cybersecurity Teams

In the ever-evolving and high-stakes world of cybersecurity, being agile isn’t just a buzzword—it’s a survival skill. Cyber threats evolve rapidly, requiring teams to adapt and respond just as fast. Traditional project management methodologies, with their rigid structures and slow-moving processes, often fall short in meeting these dynamic needs. Enter Agile, a framework initially designed for software development but one that holds immense promise for non-software teams—cybersecurity teams included. ...


How I Moved My Synology DS920+ VM to an External SSD (And Survived to Tell the Tale)

February 9, 2025 •4 min read • Vm

How I Moved My Synology DS920+ VM to an External SSD (And Survived to Tell the Tale)

A journey of SSH commands, coffee-fueled debugging, and one surprisingly cooperative USB drive The Backstory: Why Bother? Picture this: It’s 11 PM. I’m staring at my Synology DS920+, its four drive bays humming softly like a contented cat. But there’s a problem—my beloved Ubuntu VM is gasping for storage space, trapped on the NAS’s internal volume. I could shuffle drives, but that feels like performing open-heart surgery on my data hoard. Then I spot it: a lonely USB 3.0 port. ...


Dockerizing Fabric - A Comprehensive AI Augmentation Setup

February 6, 2025 •5 min read • Ai

Dockerizing Fabric - A Comprehensive AI Augmentation Setup

Fabric is an open-source AI framework by Daniel Miessler that enables granular AI integration into daily workflows through CLI commands, patterns, and customizable prompts[1][4]. This guide demonstrates how to containerize Fabric with Docker for simplified deployment. ...


Hosting Matomo with Docker Compose: A Step-by-Step Guide

May 30, 2024 •4 min read • Selfhosted

Hosting Matomo with Docker Compose: A Step-by-Step Guide

In this tutorial, we will walk you through the process of setting up Matomo, an open-source web analytics platform, using Docker Compose. This setup will include a MariaDB database, the Matomo application, and an Nginx web server to serve as a reverse proxy. ...


Hosting Home Assistant with Docker Compose: A Step-by-Step Guide

May 29, 2024 •5 min read • Selfhosted

Hosting Home Assistant with Docker Compose: A Step-by-Step Guide

Home Assistant is an open-source home automation platform that focuses on privacy and local control. It allows you to control all your smart devices from a single interface, automate tasks, and integrate with various services. Hosting Home Assistant yourself can provide greater control over your home automation setup, enhanced privacy, and the ability to customize the system to your needs. ...


VPNs: When to use a Virtual Private Network

February 5, 2021 •3 min read • Cybersecurity

VPNs: When to use a Virtual Private Network

A Virtual Private Network (VPN) secures your own device from other devices on the same local network. This is done by encrypting all traffic which leaves your machine. After that, only a chosen trusted third party machine can decrypt the traffic again. This machine will usually be hosted by either a service provider or eg. the IT department of your company. In this post, I give you some thoughts about when to use a virtual private network and when you are probably better of not using one. ...


Enumeration of your Web Servers

September 16, 2020 •4 min read • Hacking

Enumeration of your Web Servers

One first step when attackers try to tinker with your environment is often referred to as “enumeration”. As I am running multiple web services on my own servers, I am of course curious what all this open source software actually does. So let’s start with enumeration of your web servers. Naturally, I can deep dive into their source code and evaluate their functionality. However, this post shall show you how to find information on your web servers without looking at the code through enumeration. ...


Reverse Engineer the EasyPass Challenge

August 27, 2020 •3 min read • Programming

Reverse Engineer the EasyPass Challenge

In this short tutorial, we will see how to use radare2 to reverse engineer the EasyPass challenge from HTB. Let’s start by looking what the program does. ...


Methods to Assess Cybersecurity Risks

July 6, 2020 •10 min read • Risk Management

Methods to Assess Cybersecurity Risks

This post shall give you an overview of methods to assess the cybersecurity risks of your products or services. We will go through the development of risk analysis and try to understand why every part is there and what you need it for. Before we start, please be aware, this will not give you a one fits all approach or will cover the complete research from this field. Rather the goal is to make you understand what it takes to assess your IT security risks as well as prepare you to conduct basic risk assessments in the fastest and easiest way possible. So let’s directly jump in. ...

  • 1
  • 2
Nextlevel v/Peter Schneider

I work on everything cyber security and development, CVR: 42051993, mail: info@nextlevel-blog.de, phone: 60 59 76 35

Copyright © 2025 Peter Schneider. | Powered by Hinode.
The Nextlevel Blog
Code copied to clipboard