InNerd For TechbyAngelo Pio AmiranteHandling Cyber and Physical Security Incidents on Critical Infrastructures — Part 5: Threat…This article is part of a series, if you haven’t read the previous article check it out here:Mar 12, 2024Mar 12, 2024
CyberTalksTop 10 Unforgettable Cyber Attacks: From Code to ChaosAbstract: This article delves into the annals of cyber warfare, examining the top 10 unforgettable cyber attacks that have left an…Aug 22, 2023Aug 22, 2023
Enes AdışenWhat is DoS/DDoS?In this article, we will cover one of the world’s most known cyber attacks: Denial of Service. Before we start boring definitions and…Aug 22, 2023Aug 22, 2023
Ramazan SalmanIncident handling with Splunk — [Writeup] —This room covers an incident Handling scenario using Splunk. An incident from a security perspective is “Any event or action, that has a…Feb 28, 2023Feb 28, 2023
Antonio FormatoChatGPT and Microsoft Sentinel — simplify the incident handling processToday, I’m excited to share my experience testing the integration of ChatGPT with Microsoft Sentinel. My goal with this integration was…Jan 30, 20236Jan 30, 20236
Aaron StrattonMalware Traffic Analysis | Spoonwatch WriteupTime for another malware traffic analysis exercise! These are really enjoyable and quick little exercises while still offering a lot of…Jul 5, 2022Jul 5, 2022
Roger GalobardesIncident Response 101With the explosion of EDR/XDR technologies, terms like “Incident Response” and “Threat Hunting” are hot topics in cybersecurity…Jan 8, 20221Jan 8, 20221