WordPress is one of the most popular CMS and website server in the world. It handles “more than 30%” of the websites on the internet. Because of this, bad actors are really interested in finding ways to get control of them. In this post I explain how to detect a WordPress bruteforve.
A Zero Trust Architecture (ZTA) is an Information Security architecture based on the idea that a network shouldn’t have inherent trust on the internal boundary. This post explain what it is and what I think of it.
Maybe you saw the news on the SolarWinds hack. If you didn’t, you should follow me on Twitter: https://twitter.com/TristanDostaler
In this post I want to explain, in a way understandable by everyone, why this hack matters.
If we try to reduce the security problem to only the technology, we’ll fail miserably.
In this post I’ll explain the basics on using a SIEM: how to search logs and how to send alerts.
In this post I’ll explain what is Sysmon, how to install it and how to use it to detect important pattern.
When we have a lot of Windows machine in our environment, it can be useful to be able to detect a bruteforce on a machine.
In this post I’ll explain how to detect an attacker that uses PsExec to connect to your computer when you don’t have visibility over the attacker’s computer.
In this post, I’ll explain how to initially setup a SIEM so you can receive your first logs.
The fact that we didn’t know Defender blocked an attack and we only learned it when we receive the report should be considered a disaster!