Book now with code EOY2025
Hi all, What is the minimum number of IPs flagged as malicious on VirusTotal that your team has before a particular IOC is considered MALICIOUS. Can you share your reason? Wanted shared insights because from working at different companies I have seen anywhere from 2 to 30 malicious flags before teams determine an IP (or…
Hi all, I am trying to understand the advantage of layering in networking, more precisely, why network layering is important for protocol and standard formation. Would you please share your understanding? Thanks.
The 2023 Verizon Data Breach Investigation report is hot off the (virtual) presses! 2023 DBIR Full (PDF) 2023 DBIR Executive Summary (PDF)2023 DBIR Key Insights (PDF)
My organization is interested in exploring the built-in DLP features of MCAS, but it is new to us. I am curious to hear of other's experience with this solution. The product may not be as mature as the Symantec solution, but we are trying to go cloud native whenever possible.
I figured some of my information is outdated as there are numerous new providers. I'm trying to compile a list of cert suggestions for beginners in various specialisation and could use your help! 1) Pentesting Cyber Mentor certifications / trainingeLearnSecurity eJPT SANS GPEN (although not something I'd recommend, the…
Hi all, So their's a WeChat.exe that shows up as Malware on VirusTotal (see below). WeChat is a popular social media app used legitimately in China. For you experienced folks what do you all typically do in your corporate environments? Link To VirusTotal WeChat Hash Analysis
I have problem on my my WAF , ihave two interfaces connected to waf inside and outside , suddenly the web page of my company stoped when i try to entire to it , when i refresh the page the page work , but after seconds the page also stoped , i try to ping to the server of web the ping stoped when the page stoped , i…
Hi, I'm not an IT professional, clearly. I'm a police officer looking for tips for a fraud investigation I'm conducting. The suspect sent the victim emails, only minutes apart, and the IP address locations for these emails are hundreds of miles apart. Can someone shed light as to how this would happen? Is it IP spoofing?…
Hello Cloud Experts? How is AWS Cloud Security used in production? At the enterprise workplace so do you configure, administer, and use it directly through amazon.com/aws, or is there a cloud security tool/app that sits between the user and AWS?
Hi guys, Have any of you all used Tines? a web-based SOAR app? What are your thoughts and comments on how it compares to other competing tools?
It looks like you're new here. Sign in or register to get started.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!