Audit Active Directory Attack Paths with Bloodhound
In our experience working with SMB and enterprise IT teams, it is often unknown just how far and...
In our experience working with SMB and enterprise IT teams, it is often unknown just how far and...
As you have no doubt heard, LastPass has suffered yet another breach which makes at least 3...
At Recon, we are committed to meeting the security demands of the evolving threat landscape and...
This guide will walk you through using CanaryTokens.org to generate a token and how to use that...
The recent Log4j vulnerability (CVE-2021-44228) is unprecedented in its global scope and impact....
It’s that time of year again - DEF CON! We were thrilled to run OpenSOC again at DEF CON this year,...
We can't start a recap post without a huge THANK YOU to the community for joining us last week and...
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
If you are here hoping to learn more about using Graylog for the purpose of monitoring the security...