Xavier Ashe@infosec.pubMEnglish · 1 year agoIntroduce yourself!plus-squarepinmessage-squaremessage-square23fedilinkarrow-up19
arrow-up19message-squareIntroduce yourself!plus-squarepinXavier Ashe@infosec.pubMEnglish · 1 year agomessage-square23fedilink
BusKill@lemmy.kde.social · 4 months agoJoin BusKill @ DEF CON 32, presenting "Open Hardware Dead Man Switches"plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up15
arrow-up15external-linkJoin BusKill @ DEF CON 32, presenting "Open Hardware Dead Man Switches"plus-squarewww.buskill.inBusKill@lemmy.kde.social · 4 months agomessage-square0fedilink
MSgtRedFox@infosec.pub · 11 months agoSecurity Control Frameworksplus-squaremessage-squaremessage-square0fedilinkarrow-up13
arrow-up13message-squareSecurity Control Frameworksplus-squareMSgtRedFox@infosec.pub · 11 months agomessage-square0fedilink
MSgtRedFox@infosec.pub · 11 months agoVulnerability Assessmentsplus-squaremessage-squaremessage-square0fedilinkarrow-up15
arrow-up15message-squareVulnerability Assessmentsplus-squareMSgtRedFox@infosec.pub · 11 months agomessage-square0fedilink
cyberhakon@infosec.pubEnglish · 1 year agoEdge history forensics – part 2 (downloads and search)plus-squaresafecontrols.blogexternal-linkmessage-square0fedilinkarrow-up14
arrow-up14external-linkEdge history forensics – part 2 (downloads and search)plus-squaresafecontrols.blogcyberhakon@infosec.pubEnglish · 1 year agomessage-square0fedilink
Xavier Ashe@infosec.pubMEnglish · 1 year agoALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comXavier Ashe@infosec.pubMEnglish · 1 year agomessage-square0fedilink
cyberhakon@infosec.pubEnglish · 1 year agoHacktivists with exaggerated claims again?plus-squarewww.bleepingcomputer.comexternal-linkmessage-square2fedilinkarrow-up16
arrow-up16external-linkHacktivists with exaggerated claims again?plus-squarewww.bleepingcomputer.comcyberhakon@infosec.pubEnglish · 1 year agomessage-square2fedilink
m4iler@infosec.pubEnglish · edit-21 year agoISO27001/27002 - Am I missing something?plus-squaremessage-squaremessage-square8fedilinkarrow-up111
arrow-up111message-squareISO27001/27002 - Am I missing something?plus-squarem4iler@infosec.pubEnglish · edit-21 year agomessage-square8fedilink
cyberhakon@infosec.pub · 1 year agoExcel as log analysis tool?plus-squarewww.mandiant.comexternal-linkmessage-square0fedilinkarrow-up17
arrow-up17external-linkExcel as log analysis tool?plus-squarewww.mandiant.comcyberhakon@infosec.pub · 1 year agomessage-square0fedilink
UselesslyBrisk@infosec.pubEnglish · 1 year agoModern Attack Methods You Should Knowplus-squarearchive.phexternal-linkmessage-square0fedilinkarrow-up12
arrow-up12external-linkModern Attack Methods You Should Knowplus-squarearchive.phUselesslyBrisk@infosec.pubEnglish · 1 year agomessage-square0fedilink
Xavier Ashe@infosec.pubMEnglish · 1 year agoContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comexternal-linkmessage-square0fedilinkarrow-up18
arrow-up18external-linkContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comXavier Ashe@infosec.pubMEnglish · 1 year agomessage-square0fedilink
0xCBE@infosec.pubEnglish · 1 year agoEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-squaregithub.comexternal-linkmessage-square1fedilinkarrow-up16
arrow-up16external-linkEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-squaregithub.com0xCBE@infosec.pubEnglish · 1 year agomessage-square1fedilink
cyberhakon@infosec.pubEnglish · 1 year agogeo_info_from_ip_address() - Azure Data Explorerplus-squarelearn.microsoft.comexternal-linkmessage-square0fedilinkarrow-up110
arrow-up110external-linkgeo_info_from_ip_address() - Azure Data Explorerplus-squarelearn.microsoft.comcyberhakon@infosec.pubEnglish · 1 year agomessage-square0fedilink
cyberhakon@infosec.pub · 1 year agoReports from MSSP's - what do people actually care about?plus-squaremessage-squaremessage-square2fedilinkarrow-up12
arrow-up12message-squareReports from MSSP's - what do people actually care about?plus-squarecyberhakon@infosec.pub · 1 year agomessage-square2fedilink
0xCBE@infosec.pubEnglish · 1 year agoNVD damage continuedplus-squaredaniel.haxx.seexternal-linkmessage-square1fedilinkarrow-up12
arrow-up12external-linkNVD damage continuedplus-squaredaniel.haxx.se0xCBE@infosec.pubEnglish · 1 year agomessage-square1fedilink
ChocolateCoat@infosec.pub · 1 year ago".Zip" top-level domains draw potential for information leaksplus-squareblog.talosintelligence.comexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-link".Zip" top-level domains draw potential for information leaksplus-squareblog.talosintelligence.comChocolateCoat@infosec.pub · 1 year agomessage-square0fedilink
hawx@infosec.pubEnglish · 1 year agoRed team posted their versionplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up13
arrow-up13external-linkRed team posted their versionplus-squaregithub.comhawx@infosec.pubEnglish · 1 year agomessage-square0fedilink
0xCBE@infosec.pubEnglish · edit-21 year agoWhat does your security organization look like?plus-squaremessage-squaremessage-square2fedilinkarrow-up14
arrow-up14message-squareWhat does your security organization look like?plus-square0xCBE@infosec.pubEnglish · edit-21 year agomessage-square2fedilink
Xavier Ashe@infosec.pubMEnglish · 1 year agoSecond MOVEit Vulnerabilityplus-squaremessage-squaremessage-square0fedilinkarrow-up11
arrow-up11message-squareSecond MOVEit Vulnerabilityplus-squareXavier Ashe@infosec.pubMEnglish · 1 year agomessage-square0fedilink