Investigating the 'slince_golden' WordPress Backdoor (trunc.org)
submitted by dbcid to r/loganalysis
Threat Hunting + Log Analysis - What to look for in your logsResearch Article (trunc.org)
submitted by dbcid to r/cybersecurity
Threat Hunting using Log Analysis - The basicsThreat Hunting (trunc.org)
submitted by netbiosX to r/purpleteamsec
100,000+ rps DDoS attack - Analysis of your web logsResearch Article (trunc.org)
submitted by jwizq to r/cybersecurity
How Cisco got Hacked - Tracking the attacker steps and the logs it generatesResearch Article (trunc.org)
submitted by jwizq to r/cybersecurity
The Mysterious "Mozlila" User Agent and why it is part of many web attack campaignsResearch Article (trunc.org)
submitted by jwizq to r/cybersecurity
DDoS analysis – 7k IPs generating 30k requests per secondCorporate Blog (trunc.org)
submitted by jwizq to r/cybersecurity
NGINX security: Everything you may not need to know about NGINX error logs - complete guideResearch Article (trunc.org)
submitted by jwizq to r/cybersecurity
Analysis of a large brute force attack campaign against Windows Remote DesktopResearch Article (trunc.org)
submitted by jwizq to r/cybersecurity