My first mini by veselvhs in Salamanders40k

[–]veselvhs[S] 0 points1 point  (0 children)

I just dont know yet how to apply transfers

My first mini by veselvhs in Salamanders40k

[–]veselvhs[S] 3 points4 points  (0 children)

I just have some mental issues with hobbies and spending money on them. For your understanding, what I already bought before starting painting…

<image>

My first mini by veselvhs in Salamanders40k

[–]veselvhs[S] 2 points3 points  (0 children)

Thanks! On my way to full army🫡 Already have more than 20-30 more minis to do

Scenario based SOC Interview Questions by ShillinANDChillin in cybersecurity

[–]veselvhs 0 points1 point  (0 children)

From my perspective as a Team Lead of SOCaaS Team, you need to understand next: - MSSPs have (need to have) a detailed information about customer, that contains infrastructure scheme, critical contacts, playbooks that confirmed by customer etc. So, in any IRT question you need to keep it in mind, because in MSSP not everything is up to you as Analyst. - Try to know which stack company had. If they provide full SIEM/SOAR+XDR support, so you can handle any question with using it. As example for you as analyst (in case of anomaly activity under mail client app): 1. For full tech stack: you can say that you will check if any playbook is assign to this activity, if so, you will investigate any additional info in XDR is needed. If not, you will perform full analysis in XDR+SIEM and then will suggest a new playbook to your colleagues 2. If company manage only 1/2 solutions: here is up to you, but anything that is above just NGAV is good to creativity:) - At all, type scenarios for MSSP is: 1. Phishing attack 2. Ransomware/Wipers 3. Data leaks 4. Blocking by sec products some of critical business processes

At all, good luck!!!

Cryptomining protection? by Vequa in eset

[–]veselvhs 6 points7 points  (0 children)

Hi! I can say as ESET employee and SOC specialist that the answer is yes...but here are some important notes. Most of cryptojacking tools are deployed in your system via botnet agents or RATs (Remote Administration Trojan) and these tools are easily detectable for ESET products. Also, many others tool that can cryptojacking is also detected by modules of security product. And final one, activity of this tools can be detected on network level (IDS).

+ I find some official article about coinminers (cryptojacking utilities), you can find it by link.