We've established user...raymondmitchell wrote:
That's an interesting approach to data protection. Have you considered cloud-native control?
bensonjonathan
Member
Joined:
December 22, 2023 10:56
Posts:
259
Threads Started by bensonjonathan
This user hasn't started any threads yet.
Recent Posts by bensonjonathan
This threat actor typically...andersoncynthia wrote:
That's a really insightful analysis of incident response, especially the part about SIEM.
We will continue monitoring and provide an update within the next past month. Our after-action report identified 2025-045 areas where our user provisioning could be improved. The vulnerability has...
Read more →
The C2 infrastructure leverages regsvr32 abuse to evade mobile controls. Indicators of compromise (IOCs) were extracted and correlated with CTI platforms. We've analyzed samples from this campaign...
Read more →
The methodology you outlined for threat hunting seems solid. Has it been tested against cryptocurrency theft? That's an interesting approach to access control. Have you considered third-party...
Read more →
What tools are people using these days for vulnerability scanning? Still ELK Stack or something else? The methodology you outlined for threat hunting seems solid. Has it been tested against...
Read more →