Explore >> Select a destination


You are here

www.hecfblog.com
| | blog.nviso.eu
13.5 parsecs away

Travel
| | In this blog post we will cover why rogue subscriptions are problematic and revisit a solution published a couple of years ago on Microsoft's Tech Community. Finally, we will conclude with some hardening recommendations to restrict the creation and importation of Azure subscriptions.
| | www.openedr.com
14.1 parsecs away

Travel
| | What is EDR? Endpoint Detection and Response is a cybersecurity protection software that detects threats on end-user devices in an organization.
| | www.matano.dev
11.5 parsecs away

Travel
| | We're adding support for pulling logs and enrichment data from identity and auth sources to your Matano data lake. This means you can query failed/successful sign-in attempts, view audit logs, and query user information from popular SaaS sources directly using SQL and write detection rules to detect threats in realtime using Python!
| | www.trendmicro.com
66.2 parsecs away

Travel
| We uncovered a cyberespionage campaign targeting Middle Eastern countries. We named this campaign "Bouncing Golf" based on the malware's code in the package named "golf."