Xavier Ashe@infosec.pubMEnglish · 3 years agoIntroduce yourself!plus-squarepinmessage-squaremessage-square20linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareIntroduce yourself!plus-squarepinXavier Ashe@infosec.pubMEnglish · 3 years agomessage-square20linkfedilink
Baron von Fajita@infosec.pubEnglish · edit-21 year agoVulnerability Management Softwareplus-squaremessage-squaremessage-square2linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1message-squareVulnerability Management Softwareplus-squareBaron von Fajita@infosec.pubEnglish · edit-21 year agomessage-square2linkfedilink
MSgtRedFox@infosec.pub · 2 years agoSecurity Control Frameworksplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareSecurity Control Frameworksplus-squareMSgtRedFox@infosec.pub · 2 years agomessage-square0linkfedilink
MSgtRedFox@infosec.pub · 2 years agoVulnerability Assessmentsplus-squaremessage-squaremessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1message-squareVulnerability Assessmentsplus-squareMSgtRedFox@infosec.pub · 2 years agomessage-square0linkfedilink
cyberhakon@infosec.pubEnglish · 2 years agoEdge history forensics – part 2 (downloads and search)plus-squaresafecontrols.blogexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkEdge history forensics – part 2 (downloads and search)plus-squaresafecontrols.blogcyberhakon@infosec.pubEnglish · 2 years agomessage-square0linkfedilink
Xavier Ashe@infosec.pubMEnglish · 3 years agoALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comXavier Ashe@infosec.pubMEnglish · 3 years agomessage-square0linkfedilink
cyberhakon@infosec.pubEnglish · 3 years agoHacktivists with exaggerated claims again?plus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkHacktivists with exaggerated claims again?plus-squarewww.bleepingcomputer.comcyberhakon@infosec.pubEnglish · 3 years agomessage-square0linkfedilink
m4iler@infosec.pubEnglish · edit-23 years agoISO27001/27002 - Am I missing something?plus-squaremessage-squaremessage-square1linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareISO27001/27002 - Am I missing something?plus-squarem4iler@infosec.pubEnglish · edit-23 years agomessage-square1linkfedilink
cyberhakon@infosec.pub · 3 years agoExcel as log analysis tool?plus-squarewww.mandiant.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkExcel as log analysis tool?plus-squarewww.mandiant.comcyberhakon@infosec.pub · 3 years agomessage-square0linkfedilink
UselesslyBrisk@infosec.pubEnglish · 3 years agoModern Attack Methods You Should Knowplus-squarearchive.phexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkModern Attack Methods You Should Knowplus-squarearchive.phUselesslyBrisk@infosec.pubEnglish · 3 years agomessage-square0linkfedilink
Xavier Ashe@infosec.pubMEnglish · 3 years agoContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comXavier Ashe@infosec.pubMEnglish · 3 years agomessage-square0linkfedilink
0xCBE@infosec.pubEnglish · 3 years agoEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-squaregithub.com0xCBE@infosec.pubEnglish · 3 years agomessage-square0linkfedilink
cyberhakon@infosec.pubEnglish · 3 years agogeo_info_from_ip_address() - Azure Data Explorerplus-squarelearn.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkgeo_info_from_ip_address() - Azure Data Explorerplus-squarelearn.microsoft.comcyberhakon@infosec.pubEnglish · 3 years agomessage-square0linkfedilink
cyberhakon@infosec.pub · 3 years agoReports from MSSP's - what do people actually care about?plus-squaremessage-squaremessage-square1linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareReports from MSSP's - what do people actually care about?plus-squarecyberhakon@infosec.pub · 3 years agomessage-square1linkfedilink
0xCBE@infosec.pubEnglish · 3 years agoNVD damage continuedplus-squaredaniel.haxx.seexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNVD damage continuedplus-squaredaniel.haxx.se0xCBE@infosec.pubEnglish · 3 years agomessage-square0linkfedilink
ChocolateCoat@infosec.pub · 3 years ago".Zip" top-level domains draw potential for information leaksplus-squareblog.talosintelligence.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link".Zip" top-level domains draw potential for information leaksplus-squareblog.talosintelligence.comChocolateCoat@infosec.pub · 3 years agomessage-square0linkfedilink
hawx@infosec.pubEnglish · 3 years agoRed team posted their versionplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRed team posted their versionplus-squaregithub.comhawx@infosec.pubEnglish · 3 years agomessage-square0linkfedilink
0xCBE@infosec.pubEnglish · edit-23 years agoWhat does your security organization look like?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWhat does your security organization look like?plus-square0xCBE@infosec.pubEnglish · edit-23 years agomessage-square0linkfedilink
Xavier Ashe@infosec.pubMEnglish · 3 years agoSecond MOVEit Vulnerabilityplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareSecond MOVEit Vulnerabilityplus-squareXavier Ashe@infosec.pubMEnglish · 3 years agomessage-square0linkfedilink