❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Introduction to Zeek Log Analysis

By: BHIS
13 January 2025 at 11:00

In this video, Troy Wojewoda discusses the intricacies of Zeek log analysis, focusing on how this network security monitoring system can be used to understand traffic and analyze logs effectively.

The post Introduction to Zeek Log Analysis appeared first on Black Hills Information Security, Inc..

How to Build a 404 page not found C2

By: BHIS
20 July 2016 at 14:37

A Guest blog by Matthew Pawelski // A C2, or command-and-control, is used by attackers to control compromised systems. Most of these C2s are in control of large botnets, yet […]

The post How to Build a 404 page not found C2 appeared first on Black Hills Information Security, Inc..

❌
❌