Inspired by Insecure

indicators of compromise

05/09/16 |Blog # , , ,

Talent Lab and Indicators of Compromise

The data obtained by Honeypot sensors requires manual analysis and interpretation, and in most cases cannot be used in automated tools to identify the threat in other segments of the network. It is necessary to create and demonstrate a set of data that can be used as indicators of compromise (IoC) and which is received in an automated mode. The use of this data by other automated tools should not lead to false positives.
Continue reading

0 likes no responses
Stay up to date

Twitter
70x #DDoS amplification using CLDAP https://t.co/SzYNE1Gh28
How the Connected Medicine breaches its "First do no harm" principle #IoT #TheSAS2017 https://t.co/fHgJyss5eN https://t.co/HXRftB1e63
RT @assolini: Second country with most medical devices exposed on internet: Brazil, according @difezza at #TheSAS2017 https://t.co/A0fpUCpw…
90% of #SmartTV are vulnerable to remote hacking via DVB-T signal https://t.co/q9Np532NFm
Recent Comments
- Denis Makrushin to The problems of heterogeneous means of protection
Of course!...
- K. Olbert to The problems of heterogeneous means of protection
Insightful diagram, Denis. Would you mind if I use it in a presentation, with credit, of course?...
- sock2013 to Cookies Sniffer – последний шаг на пути к эксплуатации XSS.
ilovesniffer...