Powershell
loading
Project: File Integrity Monitor
·1040 words·5 mins·
loading
·
loading
CIA Triad # Before we jump into the project let’s understand why something like a File Integrity Monitor is required, for this we will need to understand the CIA triad.
Project: Honeypot and Monitoring with Azure Sentinel SIEM
·1561 words·8 mins·
loading
·
loading
Introduction # Honeypots are deceptive tools used in cybersecurity to attract and trap malicious actors. By simulating vulnerabilities, they divert attackers from real assets while gathering valuable intelligence on their tactics and methods.