0x7F
banner
0x7f0.bsky.social
0x7F
@0x7f0.bsky.social
it-security enthusiast, hacker, security researcher, infosec, purple team, ccc bubble
Reposted by 0x7F
Hackers Abuse URL Rewriting In Sophisticated Phishing Attack
Hackers Abuse URL Rewriting In Sophisticated Phishing Attack
Threat actors have been increasingly abusing URL rewriting features, which are designed to protect users from phishing threats, to carry out sophisticated attacks.
cybersecuritynews.com
November 25, 2024 at 6:17 AM
Reposted by 0x7F
In #FOR577 today, we are talking about issues trying to read auditd logs when you dont have access to good tools.

Although there is no one-size-fits-all solution, I've found that deploying an Elastic docker container and ingesting data really speeds things up.

www.linkedin.com/pulse/linux-...
Linux DFIR - Rapid Audit Log Ingestion with Elasticsearch
A guide to using Elasticsearch and Kibana containers to rapidly analyse complex Linux logs, such as the auditd log files.
www.linkedin.com
November 20, 2024 at 7:12 PM