Intel Owl v3.0.0 speeds up threat intelligence retrieval
Guest Post: With 100+ analysers, Intel Owl helps with incident response, threat analysis, security research and threat hunting.
Guest Post: With 100+ analysers, Intel Owl helps with incident response, threat analysis, security research and threat hunting.
Guest Post: Team Cymru takes us through the steps of a threat hunt.
Guest Post: Sigma is an open-source project that tries to solve challenges with store logs in different repositories.
Guest Post: Yara rules are an easy yet important threat hunting tool for searching for malicious files in your directories.
We must anticipate changes in computational capacity when choosing an encryption algorithm, but is it relevant to DNSSEC?
Asia Pacific organizations are getting better and more proactive at detecting compromises in their own network.
Guest Post: Researchers show how middleboxes and censorship infrastructure can be abused to launch reflected DoS amplification attacks over TCP.
Guest Post: Institutions that run their own recursive resolvers and route from their own AS are most susceptible to privacy risks.
Guest Post: Maintaining an accurate inventory of active IP addresses is critical for security.
Adli Wahid participated as a moderator and speaker at the ITU Global Cyberdrill 2021, held online from 15 to 23 September 2021.