Homepage
Open in app
Sign in
Get started
Axon Technologies
• Your Cybersecurity Partner • Protecting organizations in a digitally connected 🌍 • 📍 UAE | UK | Lebanon
Who We Are
Website
Follow
Latest
Trending
Lawrence Amer
in
Axon Technologies
Sep 19, 2019
Threat Hunting for the Most Common MITRE ATT&CK Techniques (Part 3)
Read more…
9
Firas Al-Koussa
in
Axon Technologies
Mar 3, 2020
T1093 Defense Evasion — Process Hollowing
Process hollowing is an advanced and evasive technique that…
Read more…
3
Abed Samhuri
in
Axon Technologies
Aug 24, 2020
Hosting Anonymous Website on Tor Network
Read more…
39
2 responses
Abed Samhuri
in
Axon Technologies
Apr 28, 2020
5 Things to Look for When Buying a SOC as a Service
Read more…
8
Hadi Hosn
in
Axon Technologies
Apr 13, 2020
Collaboration of the arch rivals
I recently spent some time reviewing the detail behind
Apple and Google docs on the new contact…
Read more…
1
Lawrence Amer
in
Axon Technologies
Aug 27, 2019
Threat Hunting for the Most Common MITRE ATT&CK Techniques (Part 1)
Read more…
35
Hadi Hosn
in
Axon Technologies
Jun 8, 2020
Finding Cyber Security Opportunities in Crisis. How Business Leaders Can Prepare Right Now
Read more…
7
Lawrence Amer
in
Axon Technologies
Aug 15, 2019
An In-Depth Look at the Capital One Data Breach
Capital One Hack
Read more…
6
Lawrence Amer
in
Axon Technologies
Oct 14, 2019
Threat Hunting for the Most Common MITRE ATT&CK Techniques (Part 4)
Read more…
7
4484
in
Axon Technologies
Apr 8, 2020
Cybersecurity controls to implement before onboarding your team — Zoom
Read more…
1
About
Axon Technologies
• Your Cybersecurity Partner • Protecting organizations in a digitally connected 🌍 • 📍 UAE | UK | Lebanon
More information
Followers
86
Elsewhere