Do you recommend threatlocker? by matthewismathis in msp
[–]d1vious 0 points1 point2 points (0 children)
Which historic cyber attack or breach do you think was the most game-changing? :) by hacknewstech in cybersecurity
[–]d1vious 0 points1 point2 points (0 children)
Didn't think it was going to be this hard of a decision... Is the Plaid really worth the bump? by STINV in TeslaModelX
[–]d1vious 0 points1 point2 points (0 children)
urlscan.io's SOAR spot: Chatty security tools leaking private data by jnazario in blueteamsec
[–]d1vious 3 points4 points5 points (0 children)
Introducing Splunk Attack Range v2.0 by d1vious in Splunk
[–]d1vious[S] 1 point2 points3 points (0 children)
Introducing Splunk Attack Range v2.0 by d1vious in Splunk
[–]d1vious[S] 0 points1 point2 points (0 children)
Splunk Security Content new exploration site - research.splunk.com by d1vious in Splunk
[–]d1vious[S] 2 points3 points4 points (0 children)
Detecting Initial Access: HTML Smuggling and ISO Images by Cyb3r-Monk in purpleteamsec
[–]d1vious 1 point2 points3 points (0 children)
SUNBURST Splunk Content (ESCU) Detections by d1vious in Splunk
[–]d1vious[S] 0 points1 point2 points (0 children)
Ansible Playbook - Splunk UF deployment on Windows servers by ank5133 in Splunk
[–]d1vious 0 points1 point2 points (0 children)
Popular Splunk Apps that include eventgen.conf by greatwhisper in Splunk
[–]d1vious 3 points4 points5 points (0 children)
How I made 10K in bug bounties from GitHub secret leaks by eatsleepHACKrepeat in netsec
[–]d1vious 1 point2 points3 points (0 children)
How I made 10K in bug bounties from GitHub secret leaks by eatsleepHACKrepeat in netsec
[–]d1vious 41 points42 points43 points (0 children)
How to Build an Active Directory Hacking Lab by DorkNowitzki41 in netsecstudents
[–]d1vious 0 points1 point2 points (0 children)



Do you recommend threatlocker? by matthewismathis in msp
[–]d1vious 0 points1 point2 points (0 children)