Security requires a mindset: continuous learning, testing, and adaptation. Compliance is like a seatbelt: it reduces risk, ...
CVE-2025-61907: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N CVE-2025-61908: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVE ...
Among the several plugins that Grafana provides is Node Graph, a useful plugin for visualizing elements and relationships between them. This plugin, as described in ...
During the NetEye Conference 2025, I discussed several analysis use cases where integrating threat intelligence information can help build a useful framework for further alert analysis. Below, I’ll ...
If you’ve followed this thread for awhile, then I hope by now you’re making great videos. Let’s assume your content is instructive, interesting and well-written, all of your equipment is working the ...
In the world of Dynamics 365 and Power Platform administration, ensuring users have timely access to environments is a common challenge. The standard synchronization process between Azure Entra ...
In modern SOC environments, detection rules are the cornerstone of identifying malicious activity. However, the effectiveness of a rule depends not only on what it looks for but also on how precisely ...
During one of my last sessions with a customer I had to deal with a very particular use case, where I couldn’t use the solution presented in my previous blog post ...
Around this time last year, I wrote a blog post about improving cybersecurity with Elastic Defend. Now, one year later, we’ve gained a lot of practical experience with it, which I’d like to share.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results