User Profile
lukepessoa
Copper Contributor
Joined 2 years ago
User Widgets
Recent Discussions
Re: Ninja Cat Giveaway: Episode 5 | Mobile Threat Defense
Hello HeikeRitter, Here are 3 common attack vectors on mobile devices: Malware: Malicious software can be installed on a mobile device through various means such as phishing emails, SMS messages, or by downloading a malicious app. Network attacks: Mobile devices are often connected to public Wi-Fi networks, which can be used to intercept data and launch attacks such as man-in-the-middle attacks. Attackers can also create fake Wi-Fi hotspots to trick users into connecting and stealing their data. Device vulnerability: A device with an outdated operating system. I love the series and look forward to the upcoming episodes. Keep up the amazing work!50KViews0likes0CommentsRe: Ninja Cat Giveaway: Episode 3 | Sentinel integration
One of my favorite features presented by Javier in the video was the threat-hunting module in Microsoft Sentinel which enables security analysts to proactively search for security threats within an organization's IT environment. I find the threat-hunting module a powerful tool that allows organizations to proactively detect and respond to potential threats before they escalate into more serious security incidents. UEBA stands for User and Entity Behavior Analytics. It is a type of cybersecurity technology that uses machine learning algorithms to analyze and identify anomalous behavior patterns in users and entities accessing a computer network. The goal is to detect potential insider threats or external attacks that may be missed by traditional security measures.2.3KViews0likes2CommentsRe: Ninja Cat Giveaway: Episode 4 | Defender Experts for Hunting Overview
HeikeRitter Defender Experts for Hunting is a service provided by Microsoft Defender for Endpoint that allows organizations to proactively identify and respond to advanced threats that may have bypassed traditional security measures. The service is staffed by Microsoft security experts who use advanced analytics and threat intelligence to hunt for suspicious activity and potential threats in an organization's environment. The goal of Defender Experts for Hunting is to help organizations identify and contain threats before they can cause significant harm. Threat hunting is the proactive process of searching for and identifying potential threats in an organization's environment that may have gone undetected by traditional security measures. Threat hunting involves analyzing system logs, network traffic, and other data sources to identify suspicious activity that may indicate the presence of a threat. The goal of threat hunting is to catch threats early in the attack chain and prevent them from causing significant harm. Threat hunting can be conducted manually by security analysts or through the use of automated tools that use machine learning and artificial intelligence to identify potential threats.51KViews0likes1Comment
Groups
Recent Blog Articles
No content to show