FIKARA BILALblog.fikara.io·Aug 29, 2024Déploiement des agents WazuhPré-requis Installation de Wazuh Il existe plusieurs moyens de déployer l'agent Wazuh sur les terminaux. Après avoir installé correctement le wazuh-dashboard, le wazuh-manager et le wazuh-indexer, les agents peuvent maintenant être installés depuis...Discuss·103 readsSecurity
FIKARA BILALblog.fikara.io·Aug 29, 2024Wazuh: InstallationWazuh est une plateforme open-source qui offre des moyens de détecter des menaces, de répondre aux incidents, de surveiller l'intégrité des fichiers et de fournir une visibilité sur l'ensemble de l'infrastructure. Wazuh est essentiellement un SIEM, u...Discuss·371 readsSecurity
Jonathan DeLeonforCybersecurity Projects & Blogmrcyberleon.hashnode.dev·Aug 24, 2024SOAR + EDR Project using Lima Charlie / TinesObjective: Utilizing SOAR automation for Endpoint Detection & Response (EDR) to enhance workflow efficiency and automate the isolation of a device across multiple communication channels. Tools Used: In this project, I employed a range of sophisticate...DiscussLima Charlie
TATHAGATA ROYthreatradar.vercel.app·Aug 21, 2024Enhancing Cybersecurity with SOAR-EDR: A Comprehensive Project Using LimaCharlie, Slack, and TinesHere in this project the enhancement of cybersecurity with a SOAR-EDR project using LimaCharlie, Slack, and Tines will be demonstrated. Introduction to SOAR-EDR Integration Overview of SOAR-EDR and Its Importance Definition of SOAR and EDR: Security...Discuss·80 reads#cybersecurity
Ronald Bartelshubandspoke.amastelek.com·Jul 24, 2024💊EDR | The Placebo Effect in Cybersecurity🚬Endpoint Detection and Response (EDR) solutions are often touted as the ultimate cybersecurity measure, with recommendations from industry analysts like Gartner pushing businesses to adopt these tools. However, the reality is that EDR is not a silver...DiscussRed Pill
Solomon Achugwohsecuredtips.hashnode.dev·Mar 4, 2024Navigating the Complexities of Modern Endpoint SecurityThe digital landscape is constantly evolving, and with it the complexity of threats we face. Businesses face a constant barrage of cyberattacks with traditional antivirus software once considered a solid defense, struggling to keep pace with increasi...Discuss·10 likesUEM
James Gallagherjamesonhacking.hashnode.dev·Mar 13, 2023Low-Tech EDR Bypasses That WorkIn this blog post, I'll share two low-tech methods I've used for defeating antivirus, EDR, MDR, XDR and whatever else the kids on my lawn are calling it these days. The first is a method I've been using for years that has yielded many wins for me dur...Discuss·246 readsEDR
Cyrill GremaudforDina - Technical Security Blogsecurity.dina.ch·Jun 27, 2022Microsoft Defender for Endpoint - Threat Hunting Cheat SheetLes personnes utilisant la solution Microsoft Defender for Endpoint bénéficient d'un module dédié à la recherche de menace très performant, Advanced Hunting. Threat Hunting - Kesako ? Le Threat Hunting est une technique qui consiste à rechercher proa...Discuss·101 readsVulnerabilitythreat