Blog Post by Siddhant Mishra
Siddhant MishraOct 27, 2024 9:00:00 AM5 min read
Strategies to Detect Post Exploitation Active Directory Reconnaissance
Table of Content Introduction Detecting Post Exploitation Active Directory Reconnaissance ...
Start Reading
Siddhant MishraJul 3, 2023 11:35:02 PM3 min read
Bridging the Gap: Making Expert SOC Analyst Capabilities Accessible
Introduction A SOC analyst plays a vital role in identifying and investigating potential ...
Start Reading
Siddhant MishraMar 31, 2023 12:56:39 AM3 min read
Centralizing AWS Logging: A Customer Success Story
As companies increasingly move their workloads to the cloud, securing cloud assets ...
Start Reading
Siddhant MishraOct 1, 2022 1:55:48 AM2 min read
Two Zero-day Vulnerabilities in Microsoft Exchange Exploited in Wild
We are working on an accelerated timeline to release a fix. Until then, we’re providing ...
Start Reading
Siddhant MishraAug 23, 2022 2:49:07 AM5 min read
Return of BlackByte Ransomware
On February 11, 2022, FBI and Unites States Secret Service (USSS) released a joint ...
Start Reading
Siddhant MishraAug 10, 2022 10:36:14 PM4 min read
Protect your Active Directory from Admin SDHolder Attack
Start ReadingSiddhant MishraOct 7, 2021 12:55:00 AM4 min read
Best Practices to Manage Your SIEM Content
The basic foundation of security monitoring, detection and response depends on the ...
Start Reading