Threat hunting with Kolide and osquery
Introduction In this article, we’ll discuss how we can use Kolide Fleet for threat-hunting purposes. This article is not intended to be an introductory piece, but rather a write-up showing the... Go on to the site to read the full article ... Read More
Threat hunting with osquery
Introduction In this article, we take a look at osquery and how it can be used to query the security, reliability and compliance information of systems within your network environment. This is not a... Go on to the site to read the full article ... Read More
Ransomware analysis with Volatility
Introduction In this article, we’ll discuss the Volatility framework and how to perform analysis on ransomware using it. We’ll discuss various capabilities of the tool that can allow us to perform... Go on to the site to read the full article ... Read More
Using third-party services for credential theft
Introduction In this article, we discuss the security of third-party services which perform specialized functions, such as storing user credentials or logging in on behalf of the user. We’ll look at... Go on to the site to read the full article ... Read More
The future of employee monitoring
Introduction In this article, we discuss employee monitoring inside and outside the workplace. We’ll look at current capabilities and challenges faced by these solutions today and the possible... Go on to the site to read the full article ... Read More
Threat hunting with Cymon API
Introduction In this article, we’ll discuss mock intrusion attempts on our systems and show you how to make use of Cymon API to query important information that you can use in an effective threat... Go on to the site to read the full article ... Read More
Threat hunting with SaltOpen
Introduction The SaltStack platform is an open-source and Python-based configuration management software. Using Salt, developers and system administrators can better manage their infrastructure and... Go on to the site to read the full article ... Read More
Threat hunting with Graylog
Introduction Graylog is a leading centralized log management solution which allows security teams to log, store and analyze huge amounts of data. One area where Graylog especially shines is in its... Go on to the site to read the full article ... Read More
Wireless Security Guide: Introduction to LEAP Authentication
Introduction The LEAP (Lightweight Extensible Authentication Protocol) is a communications protocol that was developed by Cisco for use in point-to-point connections and wireless networks. However,... Go on to the site to read the full article ... Read More
Exploring Commonly-Used Yet Vulnerable Components
Introduction In this article, we will explore some technologies that are commonly used today despite being known to be vulnerable. We’ll discuss why these technologies are considered vulnerable, and... Go on to the site to read the full article ... Read More