Xavier AsheMEnglish · 1 year agoIntroduce yourself!plus-squarepinmessage-squaremessage-square22fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1message-squareIntroduce yourself!plus-squarepinXavier AsheMEnglish · 1 year agomessage-square22fedilink
BusKill@lemmy.kde.social · 4 months agoJoin BusKill @ DEF CON 32, presenting "Open Hardware Dead Man Switches"plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkJoin BusKill @ DEF CON 32, presenting "Open Hardware Dead Man Switches"plus-squarewww.buskill.inBusKill@lemmy.kde.social · 4 months agomessage-square0fedilink
MSgtRedFox · 11 months agoSecurity Control Frameworksplus-squaremessage-squaremessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareSecurity Control Frameworksplus-squareMSgtRedFox · 11 months agomessage-square0fedilink
MSgtRedFox · 11 months agoVulnerability Assessmentsplus-squaremessage-squaremessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareVulnerability Assessmentsplus-squareMSgtRedFox · 11 months agomessage-square0fedilink
cyberhakonEnglish · 1 year agoEdge history forensics – part 2 (downloads and search)plus-squaresafecontrols.blogexternal-linkmessage-square0fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkEdge history forensics – part 2 (downloads and search)plus-squaresafecontrols.blogcyberhakonEnglish · 1 year agomessage-square0fedilink
Xavier AsheMEnglish · 1 year agoALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comXavier AsheMEnglish · 1 year agomessage-square0fedilink
cyberhakonEnglish · 1 year agoHacktivists with exaggerated claims again?plus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHacktivists with exaggerated claims again?plus-squarewww.bleepingcomputer.comcyberhakonEnglish · 1 year agomessage-square2fedilink
m4ilerEnglish · edit-21 year agoISO27001/27002 - Am I missing something?plus-squaremessage-squaremessage-square6fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1message-squareISO27001/27002 - Am I missing something?plus-squarem4ilerEnglish · edit-21 year agomessage-square6fedilink
cyberhakon · 1 year agoExcel as log analysis tool?plus-squarewww.mandiant.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkExcel as log analysis tool?plus-squarewww.mandiant.comcyberhakon · 1 year agomessage-square0fedilink
UselesslyBriskEnglish · 1 year agoModern Attack Methods You Should Knowarchive.phexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkModern Attack Methods You Should Knowarchive.phUselesslyBriskEnglish · 1 year agomessage-square0fedilink
Xavier AsheMEnglish · 1 year agoContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comXavier AsheMEnglish · 1 year agomessage-square0fedilink
0xCBEEnglish · 1 year agoEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-squaregithub.comexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-squaregithub.com0xCBEEnglish · 1 year agomessage-square1fedilink
cyberhakonEnglish · 1 year agogeo_info_from_ip_address() - Azure Data Explorerplus-squarelearn.microsoft.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkgeo_info_from_ip_address() - Azure Data Explorerplus-squarelearn.microsoft.comcyberhakonEnglish · 1 year agomessage-square0fedilink
cyberhakon · 1 year agoReports from MSSP's - what do people actually care about?plus-squaremessage-squaremessage-square2fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareReports from MSSP's - what do people actually care about?plus-squarecyberhakon · 1 year agomessage-square2fedilink
0xCBEEnglish · 1 year agoNVD damage continuedplus-squaredaniel.haxx.seexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNVD damage continuedplus-squaredaniel.haxx.se0xCBEEnglish · 1 year agomessage-square1fedilink
ChocolateCoat · 1 year ago".Zip" top-level domains draw potential for information leaksplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link".Zip" top-level domains draw potential for information leaksplus-squareblog.talosintelligence.comChocolateCoat · 1 year agomessage-square0fedilink
hawxEnglish · 1 year agoRed team posted their versionplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRed team posted their versionplus-squaregithub.comhawxEnglish · 1 year agomessage-square0fedilink
0xCBEEnglish · edit-21 year agoWhat does your security organization look like?plus-squaremessage-squaremessage-square6fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareWhat does your security organization look like?plus-square0xCBEEnglish · edit-21 year agomessage-square6fedilink
Xavier AsheMEnglish · 1 year agoSecond MOVEit Vulnerabilityplus-squaremessage-squaremessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareSecond MOVEit Vulnerabilityplus-squareXavier AsheMEnglish · 1 year agomessage-square0fedilink