Detecting Threats with Graylog Pipelines - Part 2
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
If you are here hoping to learn more about using Graylog for the purpose of monitoring the security...
Recently, our team was asked to provide training for an operational military Cyber Protection Team...
Hello OpenSOC fam! First and most importantly, we hope that you and yours are healthy and happy in...
We're thrilled to be accepted back to BlackHat to run our live-fire Network Defense Range (NDR)...
We never wrote up a blog post for DC27, but this excerpt from the closing ceremonies covers most of...
The Recon incident response team recently worked an intrusion case involving a Confluence web...
In a previous post, we shared our affinity for ZeroTier:
We're very excited to announce that we'll be bringing our NDR training to Black Hat this year! Come...
Huge thanks to @BlueTeamVillage and all of the awesome projects that make up OpenSOC Blue CTF!