In this post I’ll explain the basics on using a SIEM: how to search logs and how to send alerts. This is the third post of the series “SIEM 101” where I explain the basics of a SIEM, from [...]
In this post, I’ll explain how to initially setup a SIEM so you can receive your first logs. This is the second post of the series “SIEM 101″ where I explain the basics of a SIEM, from [...]
As you may know from my posts, I like Elasticsearch. However, Elastic, the Elasticsearch company, recently announced it’s decision to change the license of it’s open-source products. [...]
In the following days, I’ll write a few blog posts explaining how to easily learn to use a Security Information and Event Management, or SIEM. But what is a SIEM? As Varonis puts it: [...]
Maybe you saw the news on the SolarWinds hack. If you didn’t, you should follow me on Twitter: https://twitter.com/TristanDostaler In this post I want to explain, in a way understandable by [...]
More and more companies are pointing out that the user support service regularly receives a large volume of requests relating to users who encounter difficulties when logging on. If a [...]
The following post describes the way I solved the challenge Exam Solutions from the NorthSec 2020 CTF. A zip file containing two files was provided: SeverityHighProtector.zip [...]
In the last Northsec event, I had the chance to play with a fun audio challenge. I had never done an audio steganography challenge before, so maybe the way I did it may seem obvious for some, but [...]
Although most employees use network or cloud folders to back up business documents, some employees may back up files locally on their devices (computer, tablet, etc.), sometimes for convenience [...]