How to: Detect and prevent common data exfiltration attacks
Guest Post: Mitigate for APT threats with these best practices for detecting and preventing data exfiltration attacks.
Guest Post: Mitigate for APT threats with these best practices for detecting and preventing data exfiltration attacks.
Guest Post: Learn how to combine Yara with other tools to have full control over the condition validation process.
Guest Post: MTR is a useful tool for diagnosing packet loss.
Guest Post: Learn how to use Yara’s native hexadecimal pattern definition features to create fast rules with fewer false positives and no alarming nested loops.
Guest Post: Learn how to use Yara’s math module and min/max functions to measure distance between patterns.
Guest Post: Get to know how to use Yara with real-life research problems — detecting code evolution and shellcodes.
Guest Post: Learn how to navigate through the relevant RFCs associated with publishing IPv6 NTP servers with DHCPv6.
Guest Post: BGD e-GOV CIRT takes us through the steps of a recent Exchange cyber drill run for local financial institutions in Bangladesh.
Guest Post: Learn how to use open-source tools, Suzieq and Batfish, to validate and evaluate network automation processes.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2021’s best.