In today’s threat landscape more and more threats like fileless malware and ransomware leverage PowerShell during the exploitation stage. In this post I have written some of the best ways… Read more How to monitor and detect malicious PowerShell scripts? →
10 years ago, when Gartner defined SIEM (Security Information and Event Management) it was trending in the cybersecurity landscape, and every organization was looking for one. More players started coming… Read more Breach and Attack Simulation – BAS Products Compared →
Australia Signal Directorate (ASD) and Australia Cyber Security Centre (ACSC) has defined a strategy called Essential Eight to help organizations mitigate threats and adversaries. These eight strategies are baselines and… Read more How to protect your organization using Essential Eight mitigation strategy? →
Your SIEM (Security Information and Event Management)’s ROI depends on how effectively you tune it. Data sources like Firewall, AD server, File server, generates millions of logs every day. Without… Read more How to reduce noise in your SIEM? →
When I receive a request to monitor critical events from a vendor, it becomes a cumbersome task to gather information about the vendor, log schema, and event types. This information… Read more Events of Interest to monitor in Cisco ASA Firewall/IPS →
Active directory in Windows have some built in features to set restriction for passwords created in your environment. How cool would it be if we can compare the passwords used… Read more Active Directory Password Audit – Using Pwned Passwords →