Tools & Techniques
Sharing tools and techniques for security analysis
Thread
Stats
Last Post
Open Source Intelligence Gathering Guide
Started by osint_expert,
February 03, 2024 03:14
Replies:
Views: 693
May 16, 2025 21:40
Question about multi-factor authentication implementation
Started by xsnyder,
February 26, 2024 18:47
Replies:
Views: 281
June 06, 2025 01:47
New command injection in IoT ecosystems
Started by philipwilson,
August 11, 2023 01:10
Replies:
Views: 611
May 30, 2025 13:22
Seeking advice on web strategies
Started by amanda06,
April 07, 2024 20:36
Replies:
Views: 972
June 02, 2025 15:48
Observed man-in-the-middle targeting API endpoints
Started by deborahphelps,
November 12, 2024 19:07
Replies:
Views: 193
June 05, 2025 12:21
Sharing IOCs for CobaltStrike campaign
Started by kaitlinluna,
April 09, 2024 23:11
Replies:
Views: 404
May 11, 2025 00:22
Observed cryptomining targeting government agencies
Started by zanderson,
April 03, 2024 10:52
Replies:
Views: 741
May 06, 2025 05:35
Sharing IOCs for BazarLoader campaign
Started by tdiaz,
July 20, 2024 07:05
Replies:
Views: 409
April 26, 2025 12:26
How to detect process hollowing with threat feeds?
Started by haleyhurley,
August 01, 2024 05:42
Replies:
Views: 562
June 06, 2025 09:22
Analysis of recent cyber espionage
Started by maureenwiggins,
August 20, 2023 21:24
Replies:
Views: 258
May 25, 2025 20:36
Best practices for DLP in hybrid cloud
Started by terrimurillo,
May 15, 2023 05:54
Replies:
Views: 488
May 15, 2025 14:11
Best practices for host in production environment
Started by kaylaray,
April 11, 2025 07:26
Replies:
Views: 438
May 28, 2025 22:23
Seeking advice on XDR strategies
Started by andrewhernandez,
January 15, 2024 16:55
Replies:
Views: 713
May 23, 2025 13:12
Sharing IOCs for Ursnif campaign
Started by melissa10,
May 19, 2024 22:23
Replies:
Views: 292
June 11, 2025 06:05
Breaking: command injection affecting industrial control systems
Started by dennisterri,
April 01, 2024 23:51
Replies:
Views: 838
May 16, 2025 08:34
Interesting findings in Cobalt Strike analysis
Started by andreacrawford,
October 24, 2024 17:08
Replies:
Views: 218
May 27, 2025 15:03
Tutorial: Implementing IDS/IPS in healthcare systems
Started by robinsontimothy,
December 24, 2023 12:17
Replies:
Views: 96
May 18, 2025 19:59
How to detect obfuscated PowerShell with SIEM alerts?
Started by darin68,
July 28, 2024 10:43
Replies:
Views: 658
June 17, 2025 03:57
Discussion: OWASP Top 10 in modern security operations
Started by michaelduke,
January 22, 2024 21:06
Replies:
Views: 530
June 08, 2025 23:22
Breaking: cross-site scripting affecting containerized environments
Started by whitelaura,
April 05, 2024 12:13
Replies:
Views: 975
May 23, 2025 08:09
New remote code execution in widely-used frameworks
Started by robert53,
February 10, 2024 04:23
Replies:
Views: 588
June 08, 2025 03:24
Question about network segmentation implementation
Started by tdavis,
April 05, 2025 03:37
Replies:
Views: 160
June 05, 2025 16:25
Question about multi-factor authentication implementation
Started by kaitlin84,
May 13, 2024 10:32
Replies:
Views: 936
June 08, 2025 12:07
Need help with LSASS credential dumping for command and control
Started by rjohnson,
April 18, 2024 04:07
Replies:
Views: 105
May 13, 2025 18:52
Seeking advice on container strategies
Started by vmatthews,
March 17, 2025 09:17
Replies:
Views: 316
June 17, 2025 09:45
Breaking: XML external entity affecting embedded devices
Started by ashley86,
January 28, 2024 01:11
Replies:
Views: 321
June 14, 2025 07:11
Best practices for SIEM in development network
Started by esavage,
June 04, 2023 07:07
Replies:
Views: 608
June 16, 2025 14:28
Tutorial: Implementing network segmentation in telecommunications network
Started by sheila70,
February 08, 2025 00:54
Replies:
Views: 743
June 12, 2025 20:16
Interesting findings in IcedID analysis
Started by melissasoto,
November 24, 2024 04:43
Replies:
Views: 640
May 19, 2025 02:29
Tutorial: Implementing multi-factor authentication in industrial systems
Started by phillip36,
June 02, 2024 21:08
Replies:
Views: 744
May 19, 2025 13:53
New use-after-free in widely-used frameworks
Started by amanda15,
July 13, 2023 10:32
Replies:
Views: 119
May 08, 2025 22:08
Sharing IOCs for Emotet campaign
Started by tbrown,
February 08, 2024 17:09
Replies:
Views: 824
May 27, 2025 16:15
Interesting findings in BlackCat analysis
Started by christopher34,
August 17, 2023 01:18
Replies:
Views: 51
May 29, 2025 04:52
New authentication bypass in CI/CD pipelines
Started by robinsontimothy,
October 17, 2024 15:14
Replies:
Views: 197
May 31, 2025 00:08
Observed DNS hijacking targeting healthcare providers
Started by erikajackson,
August 06, 2024 16:33
Replies:
Views: 287
May 24, 2025 14:35
Sharing IOCs for Sliver campaign
Started by nbrown,
December 30, 2023 22:56
Replies:
Views: 880
May 28, 2025 21:50
Analysis of recent industrial espionage
Started by brucematthews,
May 09, 2024 16:42
Replies:
Views: 185
May 09, 2024 16:42
Interesting findings in Conti analysis
Started by spencercarter,
May 30, 2023 18:50
Replies:
Views: 877
June 10, 2025 02:17
How to detect obfuscated PowerShell with IDS signatures?
Started by drewthomas,
October 02, 2023 14:39
Replies:
Views: 807
May 18, 2025 19:54
Best practices for MFA in air-gapped systems
Started by martinmichael,
January 23, 2024 16:19
Replies:
Views: 334
June 03, 2025 09:53
New threat actor: Lazarus Group
Started by miguel98,
December 22, 2023 19:02
Replies:
Views: 631
June 07, 2025 16:53