Threat hunting with Kolide and osquery

Threat hunting with Kolide and osquery

Introduction In this article, we’ll discuss how we can use Kolide Fleet for threat-hunting purposes. This article is not intended to be an introductory piece, but rather a write-up showing the... Go on to the site to read the full article ... Read More
Threat hunting with osquery

Threat hunting with osquery

Introduction In this article, we take a look at osquery and how it can be used to query the security, reliability and compliance information of systems within your network environment. This is not a... Go on to the site to read the full article ... Read More

Ransomware analysis with Volatility

| | Malware Analysis
Introduction In this article, we’ll discuss the Volatility framework and how to perform analysis on ransomware using it. We’ll discuss various capabilities of the tool that can allow us to perform... Go on to the site to read the full article ... Read More

Using third-party services for credential theft

| | Hacking
Introduction In this article, we discuss the security of third-party services which perform specialized functions, such as storing user credentials or logging in on behalf of the user. We’ll look at... Go on to the site to read the full article ... Read More

The future of employee monitoring

| | General Security
Introduction In this article, we discuss employee monitoring inside and outside the workplace. We’ll look at current capabilities and challenges faced by these solutions today and the possible... Go on to the site to read the full article ... Read More

Threat hunting with Cymon API

Introduction In this article, we’ll discuss mock intrusion attempts on our systems and show you how to make use of Cymon API to query important information that you can use in an effective threat... Go on to the site to read the full article ... Read More
Threat hunting with SaltOpen

Threat hunting with SaltOpen

Introduction The SaltStack platform is an open-source and Python-based configuration management software. Using Salt, developers and system administrators can better manage their infrastructure and... Go on to the site to read the full article ... Read More
Threat hunting with Graylog

Threat hunting with Graylog

Introduction Graylog is a leading centralized log management solution which allows security teams to log, store and analyze huge amounts of data. One area where Graylog especially shines is in its... Go on to the site to read the full article ... Read More

Wireless Security Guide: Introduction to LEAP Authentication

| | General Security
Introduction The LEAP (Lightweight Extensible Authentication Protocol) is a communications protocol that was developed by Cisco for use in point-to-point connections and wireless networks. However,... Go on to the site to read the full article ... Read More

Exploring Commonly-Used Yet Vulnerable Components

| | General Security
Introduction In this article, we will explore some technologies that are commonly used today despite being known to be vulnerable. We’ll discuss why these technologies are considered vulnerable, and... Go on to the site to read the full article ... Read More
Loading...