chris tchassemchris21.hashnode.dev·Aug 23, 2024Intrusion Detection System (IDS) with SuricataWhat and Why an IDS An intrusion detection system is a technology used to monitor and analyze network and data traffic over a network and upon detection of unwanted traffic, an alert is activated which alarms security professionals on a potential bre...Discusssecurityawareness
Ewaldo Simon Hirasaldosimon.com·Sep 24, 2023Improving sentinel live response collectionThroughout my experience using sentinel, I felt that sentinel live response collection is not very good. This post document how I try to solve the problem and obstacles I found. Intro Sentinel have live response capabilities to do collection of dev...Discuss·27 readsdetection engineering
Ewaldo Simon Hirasaldosimon.com·Dec 23, 2021Nginx log terkait log4j/ log4shellintro log4j/ log4shell adalah sebuah vuln yang cukup menghebohkan di akhir tahun ini, hal ini karena aplikasi logging ini cukup banyak di pakai di software OSS, serta vuln. nya yang cukup parah. log4j memiliki kelemahan yang membuat attacker bisa men...Discussdetection engineering