Inspired by Insecure

indicators of compromise

05/09/16 |Blog # , , ,

Talent Lab and Indicators of Compromise

The data obtained by Honeypot sensors requires manual analysis and interpretation, and in most cases cannot be used in automated tools to identify the threat in other segments of the network. It is necessary to create and demonstrate a set of data that can be used as indicators of compromise (IoC) and which is received in an automated mode. The use of this data by other automated tools should not lead to false positives.
Continue reading

0 likes no responses
Stay up to date

70x #DDoS amplification using CLDAP
How the Connected Medicine breaches its "First do no harm" principle #IoT #TheSAS2017
RT @assolini: Second country with most medical devices exposed on internet: Brazil, according @difezza at #TheSAS2017…
90% of #SmartTV are vulnerable to remote hacking via DVB-T signal
Recent Comments
- Denis Makrushin to The problems of heterogeneous means of protection
Of course!...
- K. Olbert to The problems of heterogeneous means of protection
Insightful diagram, Denis. Would you mind if I use it in a presentation, with credit, of course?...
- sock2013 to Cookies Sniffer – последний шаг на пути к эксплуатации XSS.