Explore >> Select a destination


You are here

www.hecfblog.com
| | www.matano.dev
11.1 parsecs away

Travel
| | We're adding support for pulling logs and enrichment data from identity and auth sources to your Matano data lake. This means you can query failed/successful sign-in attempts, view audit logs, and query user information from popular SaaS sources directly using SQL and write detection rules to detect threats in realtime using Python!
| | www.hunters.security
9.3 parsecs away

Travel
| | Explore how attackers exploit Azure Managed Identities (SAMI & UAMI) for lateral movement, privilege escalation, and data exfiltration in cloud environments.
| | o365blog.com
11.3 parsecs away

Travel
| | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers
| | goggleheadedhacker.com
27.0 parsecs away

Travel
| Sodinokibi is a Ransomware-as-a-Service provider that has been covered in the news quite a bit recently. This article takes a deep-dive analysis into the inner workings of how the ransomware operates. It will focus on technical details such as how encryption keys are generated and how files are encrypted.