Machine Learning in the context of SIEM In this article we are going to see how machine learning was used to help automate a task in cyber security. In order to see if the activity in a system is generated… Read More

Machine Learning in the context of SIEM In this article we are going to see how machine learning was used to help automate a task in cyber security. In order to see if the activity in a system is generated… Read More
PHP’s Git Server Hacked to Insert Secret Backdoor to Its Source code In yet another instance of a software supply chain attack, unidentified actors hacked the official Git server of the PHP programming language and pushed unauthorized updates to insert… Read More
Guidance: Investigating and remediating on-premises Exchange Server vulnerabilities MSRC / By MSRC Team / March 16, 2021 This guidance will help customers address threats taking advantage of the recently disclosed Microsoft Exchange Server on-premises vulnerabilities CVE-2021-26855, CVE-2021-26858, CVE-2021-26857, and CVE-2021-27065, which are being exploited.… Read More
with Reverse IP lookups Often, we face a situation where we receive a domain to pentest, and after each attempt in the playbook, we still don’t find any way to get in. So, how to expand your attack surface? When… Read More