SecTemple: hacking, threat hunting, pentesting y Ciberseguridad
▼
Showing posts with label SANS. Show all posts
Showing posts with label SANS. Show all posts

Anatomy of the Follina Vulnerability (CVE-2022-30190): Exploitation, Detection, and Defense

›
The digital shadows whispered of a new ghost in the machine. Last week, a curious `.docx` file landed on a public scanner, a digital Rose...

Mastering ICS Threat Hunting: A Six-Step Defensive Blueprint

›
The fluorescent hum of outdated servers, the stale air thick with ozone. In the shadowy corners of Industrial Control Systems (ICS), thr...

Cobalt Strike Threat Hunting: The Defender's Blueprint

›
The digital shadows stir, a phantom menace lurking in the networks we strive to protect. Cracked versions of Cobalt Strike, once a whisper...

Threat Hunting in Security Operations: A Deep Dive from the Trenches

›
The flickering lights of the SOC were a familiar comfort, but tonight, they cast long shadows. Logs. Endless streams of them, a digital...

Find_Evil: A SANS@MIC Threat Hunting Deep Dive

›
The digital battlefield is a constant storm. Every organization, from the corner coffee shop to the Fortune 50 behemoth, is a target. Secu...

Is Age a Barrier to Entry in Cybersecurity? A Deep Dive for the Aspiring Operator

›
The blinking cursor on a dark terminal. The hum of servers in the distance. These are the sounds of the digital battlefield. You're ...
›
Home
View web version
Powered by Blogger.