Lengths hackers go to when hiding their exploits
Long gone is the time when if your website was compromised you’d be eaisly able to spot a file out…
Long gone is the time when if your website was compromised you’d be eaisly able to spot a file out…
WordPress is very user friendly and easy to learn content management system (CMS) for creating websites. However the ease of…
The usual credential stealing malware have consistently booked the top 4 spots each quarter of 2023, albeit jostling amongst themselves…
Its not hard to find search pages from websites with compromises. Its as simple as googling it. Actors are actively…
I’m having issues with the misp2sentinel script from cudeso which sends IOCs from the MISP API to sentinel via the…
Download Winlogbeat – Download here (64-bit) Step 1: Download and extract winlogbeat.zip to c:\program files\ (Should look like the image below) Step…
This post includes recommend Windows audit policy settings. No two environments are the same so after running for a week…
One of the great features in Wazuh is the vulnerabilities module. Both comparing installed programs against NISTs vulnerability database as…