Xavier AsheMEnglish · 3 years agoIntroduce yourself!plus-squarepinmessage-squaremessage-square23linkfedilinkarrow-up125arrow-down10
arrow-up125arrow-down1message-squareIntroduce yourself!plus-squarepinXavier AsheMEnglish · 3 years agomessage-square23linkfedilink
Baron von FajitaEnglish · edit-210 months agoVulnerability Management Softwareplus-squaremessage-squaremessage-square2linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareVulnerability Management Softwareplus-squareBaron von FajitaEnglish · edit-210 months agomessage-square2linkfedilink
MSgtRedFox · 2 years agoSecurity Control Frameworksplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareSecurity Control Frameworksplus-squareMSgtRedFox · 2 years agomessage-square0linkfedilink
MSgtRedFox · 2 years agoVulnerability Assessmentsplus-squaremessage-squaremessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareVulnerability Assessmentsplus-squareMSgtRedFox · 2 years agomessage-square0linkfedilink
cyberhakonEnglish · 2 years agoEdge history forensics – part 2 (downloads and search)plus-squaresafecontrols.blogexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkEdge history forensics – part 2 (downloads and search)plus-squaresafecontrols.blogcyberhakonEnglish · 2 years agomessage-square0linkfedilink
Xavier AsheMEnglish · 2 years agoALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comXavier AsheMEnglish · 2 years agomessage-square0linkfedilink
cyberhakonEnglish · 2 years agoHacktivists with exaggerated claims again?plus-squarewww.bleepingcomputer.comexternal-linkmessage-square2linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkHacktivists with exaggerated claims again?plus-squarewww.bleepingcomputer.comcyberhakonEnglish · 2 years agomessage-square2linkfedilink
m4ilerEnglish · edit-22 years agoISO27001/27002 - Am I missing something?plus-squaremessage-squaremessage-square6linkfedilinkarrow-up111arrow-down10
arrow-up111arrow-down1message-squareISO27001/27002 - Am I missing something?plus-squarem4ilerEnglish · edit-22 years agomessage-square6linkfedilink
cyberhakon · 2 years agoExcel as log analysis tool?plus-squarewww.mandiant.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkExcel as log analysis tool?plus-squarewww.mandiant.comcyberhakon · 2 years agomessage-square0linkfedilink
UselesslyBriskEnglish · 2 years agoModern Attack Methods You Should Knowarchive.phexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkModern Attack Methods You Should Knowarchive.phUselesslyBriskEnglish · 2 years agomessage-square0linkfedilink
Xavier AsheMEnglish · 3 years agoContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comXavier AsheMEnglish · 3 years agomessage-square0linkfedilink
0xCBEEnglish · 3 years agoEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-squaregithub.comexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-squaregithub.com0xCBEEnglish · 3 years agomessage-square1linkfedilink
cyberhakonEnglish · 3 years agogeo_info_from_ip_address() - Azure Data Explorerplus-squarelearn.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkgeo_info_from_ip_address() - Azure Data Explorerplus-squarelearn.microsoft.comcyberhakonEnglish · 3 years agomessage-square0linkfedilink
cyberhakon · 3 years agoReports from MSSP's - what do people actually care about?plus-squaremessage-squaremessage-square2linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareReports from MSSP's - what do people actually care about?plus-squarecyberhakon · 3 years agomessage-square2linkfedilink
0xCBEEnglish · 3 years agoNVD damage continuedplus-squaredaniel.haxx.seexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNVD damage continuedplus-squaredaniel.haxx.se0xCBEEnglish · 3 years agomessage-square1linkfedilink
ChocolateCoat · 3 years ago".Zip" top-level domains draw potential for information leaksplus-squareblog.talosintelligence.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-link".Zip" top-level domains draw potential for information leaksplus-squareblog.talosintelligence.comChocolateCoat · 3 years agomessage-square0linkfedilink
hawxEnglish · 3 years agoRed team posted their versionplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkRed team posted their versionplus-squaregithub.comhawxEnglish · 3 years agomessage-square0linkfedilink
0xCBEEnglish · edit-23 years agoWhat does your security organization look like?plus-squaremessage-squaremessage-square6linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareWhat does your security organization look like?plus-square0xCBEEnglish · edit-23 years agomessage-square6linkfedilink
Xavier AsheMEnglish · 3 years agoSecond MOVEit Vulnerabilityplus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareSecond MOVEit Vulnerabilityplus-squareXavier AsheMEnglish · 3 years agomessage-square0linkfedilink