Detecting Linux Attacks with Splunk SIEM

Detecting Linux Attacks with Splunk SIEM

A practical guide to detecting SSH brute force, SUID abuse, persistence, and exfiltration using Splunk, auditd, and custom SPL queries

Abdulla Bagishev
NIS2 Compliance Across All Sectors *Updated*

NIS2 Compliance Across All Sectors *Updated*

NIS2 Compliance Across All Sectors: Challenges and Technical Solutions

Abdulla Bagishev
AWS Security, Compliance, and Governance - Study Notes

AWS Security, Compliance, and Governance - Study Notes

Persoonlijke studienotities over AWS Security, Compliance en Governance, gebaseerd op de AWS Certified Advanced Networking Study Guide (2e editie).

Abdulla Bagishev
Ethical Hacking: Magnum Opus - LLMNR Poisoning

Ethical Hacking: Magnum Opus - LLMNR Poisoning

Een showcase van LLMNR poisoning en de impact op cybersecurity.

Abdulla Bagishev