Aboelhamd Abdellatifaboelhmd.com·Dec 11, 2024The Rise of Fileless Cyber Attacks: What You Need to KnowIn the ever-evolving world of cybersecurity, one type of attack has gained notoriety for its ability to evade traditional defenses: fileless attacks. These stealthy incursions have shifted the paradigm of cyber threats by exploiting legitimate tools ...#FilelessAttacks
FIKARA BILALblog.fikara.io·Aug 29, 2024Wazuh: InstallationWazuh est une plateforme open-source qui offre des moyens de détecter des menaces, de répondre aux incidents, de surveiller l'intégrité des fichiers et de fournir une visibilité sur l'ensemble de l'infrastructure. Wazuh est essentiellement un SIEM, u...690 readsSecurity
Stellar Cyberstellarcyber.hashnode.dev·Jul 15, 2024Integrate Large Language Models into SIEM ToolsSecurity information and event management (SIEM) tools offer a tried and tested way of achieving insight across even the most sprawling and complex environments. Read Full ArticleOpen XDR
Ondrej Sebeladoitpshway.com·Jun 12, 2024Manage Microsoft 365 Defender (XDR) via PowerShellIn case you are using Microsoft Defender you are familiar with the security.microsoft.com portal. You also probably know that Microsoft also offers API for this security solution. Today I will show you some of my PowerShell commands (M365DefenderStuf...1.2K readsOther stuffDefender for Endpoint
Solomon Achugwohsecuredtips.hashnode.dev·Mar 4, 2024Navigating the Complexities of Modern Endpoint SecurityThe digital landscape is constantly evolving, and with it the complexity of threats we face. Businesses face a constant barrage of cyberattacks with traditional antivirus software once considered a solid defense, struggling to keep pace with increasi...10 likesUEM
Stellar Cyberstellarcyber.hashnode.dev·Feb 19, 2024EDR vs XDR: The Key DifferencesWhile Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) both represent crucial tools in today’s cybersecurity arsenal, the conversation around their capabilities can make it hard to parse the difference. Read Full Articl...Endpoint Detection and Response (EDR) Market
Stellar Cyberstellarcyber.hashnode.dev·Feb 17, 2024Considering an XDR Purchase? Here Are Our Lessons Learned.Lessons learned from our search for, and integration of, our XDR Trusted Internet is now deploying Stellar Cyber XDR –as a SOC-monitored solution or as an Infrastructure as a Service. The marketing hype around XDR is deafening for those of you consid...xdr
Stellar Cyberstellarcyber.hashnode.dev·Feb 16, 2024Technical Approach To Universal EDRFor security vendors and those in the XDR market specifically, there is an architectural axis of build vs. integrate. On one end, you have “Build / Acquire Everything” – vendors that are vertically integrated and want to be an enterprise’s entire sec...Open XDR
Stellar Cyberstellarcyber.hashnode.dev·Feb 16, 2024XDR will converge from different directions: XDR, Open XDR, Native XDR, Hybrid XDR -> XDR2022 Predictions By Aimei Wei Initial definitions of XDR envisioned eXtended Detection and Response – a single platform that unified detection and response across the entire security kill chain. According to Rik Turner, who coined the XDR acronym, X...xdr
Stellar Cyberstellarcyber.hashnode.dev·Feb 16, 2024XDR/Open XDR Q&AWhat are the most common misconceptions about XDR? One of the common misconceptions is that XDR is automatically the ideal security solution. Point security solution vendors position XDR as the Holy Grail if you are using their product suite. By defa...xdr