2025-03-06 | Guy Bruneau | DShield Traffic Analysis using ELK |
2025-02-13 | Guy Bruneau | DShield SIEM Docker Updates |
2024-10-31 | Guy Bruneau | October 2024 Activity with Username chenzilong |
2024-10-03 | Guy Bruneau | Kickstart Your DShield Honeypot [Guest Diary] |
2024-09-18 | Guy Bruneau | Time-to-Live Analysis of DShield Data with Vega-Lite |
2024-08-27 | Guy Bruneau | Vega-Lite with Kibana to Parse and Display IP Activity over Time |
2024-05-28 | Guy Bruneau | Is that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary] |
2022-03-15 | Xavier Mertens | Clean Binaries with Suspicious Behaviour |
2022-01-29 | Guy Bruneau | SIEM In this Decade, Are They Better than the Last? |
2020-06-19 | Remco Verhoef | Sigma rules! The generic signature format for SIEM systems. |
2019-04-04 | Xavier Mertens | New Waves of Scans Detected by an Old Rule |
2018-06-21 | Xavier Mertens | Are Your Hunting Rules Still Working? |
2017-06-17 | Guy Bruneau | Mapping Use Cases to Logs. Which Logs are the Most Important to Collect? |
2017-03-31 | Xavier Mertens | Pro & Con of Outsourcing your SOC |
2015-12-24 | Xavier Mertens | Unity Makes Strength |
2015-03-11 | Rob VandenBrink | Syslog Skeet Shooting - Targetting Real Problems in Event Logs |
2013-07-06 | Guy Bruneau | Is Metadata the Magic in Modern Network Security? |