48 тысяч подписчиков
162 видео
How to Threat Hunt for C2 Traffic Regardless of Protocol or Port
Raspberry Pi Sensors for Home Networks
Raspberry Pi sensors for home networks
DHCP log overview
A SANS 2021 Report Top New Attacks and Threat Report
Detect Everything: Bring Google Scale NDR to your Security Operations
How to Find Lateral Movement and Reduce Dwell Times with Zeek, MITRE ATT&CK™ and the BZAR Project
HTTP log overview
Network Security Monitoring with Elastic and Corelight
Network detection & response with open source tools
How To Threat Hunt in Encrypted Network Traffic- SANS Institute
Cómo Corelight Utiliza la Inteligencia Artificial para Potenciar a los Equipos de SOC
SSH log overview
Network Detection and Incident Response with Open Source Tools
RDP Forensics without endpoint visibility
Introducing Zeek
x509 log overview
Integrating Open NDR To Automate Alert Response Via Better Network Evidence
How to find exfiltration with Zeek and MITRE ATT&CK™
Corelight’s approach to operationalizing cyber threat intelligence
Catching SSH and RDP attacks without decryption
The Power of Open-Source Zeek (formerly Bro)
Network Evidence For XDR
Speed, Extensibility, and Choice: why NDR wants to be Open
SANS Protects: The Network
Thinking Like a Threat Actor: Hunting the Ghost in the Machine