Shubham TiwariShodanSpider: A Powerful Tool for Cybersecurity ResearchIn the ever-evolving world of cybersecurity, having the right tools can make all the difference. ShodanSpider is a powerful, user-friendly…Nov 221
InDetect FYIbyAlex TeixeiraWhy you need Data Engineering Pipelines before an enterprise SIEMBy this time you've probably heard "Data is the new oil," right? So why are still so many detection engineers dealing with log data in its…Oct 17, 20231
Andy DillsThe Evolution of Security: Harnessing AI and Analytics for Advanced ProtectionIn the rapidly evolving landscape of security, organizations are increasingly turning to advanced technologies to protect assets and…Oct 1Oct 1
deepwebdiggerBuilding a Phishing Playbook: A Comprehensive GuideIn this article we will cover the practical part. This playbook is based on the Computer Security Incident Handling Guide by the National…Sep 5Sep 5
Shubham TiwariShodanSpider: A Powerful Tool for Cybersecurity ResearchIn the ever-evolving world of cybersecurity, having the right tools can make all the difference. ShodanSpider is a powerful, user-friendly…Nov 221
InDetect FYIbyAlex TeixeiraWhy you need Data Engineering Pipelines before an enterprise SIEMBy this time you've probably heard "Data is the new oil," right? So why are still so many detection engineers dealing with log data in its…Oct 17, 20231
Andy DillsThe Evolution of Security: Harnessing AI and Analytics for Advanced ProtectionIn the rapidly evolving landscape of security, organizations are increasingly turning to advanced technologies to protect assets and…Oct 1
deepwebdiggerBuilding a Phishing Playbook: A Comprehensive GuideIn this article we will cover the practical part. This playbook is based on the Computer Security Incident Handling Guide by the National…Sep 5
InDetect FYIbyAlex TeixeiraSysmon: a viable alternative to EDR?I've been recently engaged in workshops with distinct clients from completely different industries/verticals and this is a recurring topic.Jul 49
CyberSec SentinelThe Power of Microsoft Sentinel SIEM for Threat IntelligenceExploring Key Advantages, Features, and Integrations for Enhanced Security3d ago