Detection Engineering 25/October/2023 False positives in threat detection Understand the need to create exceptions, adjust detection logic and rules, implement processes to handle alerts and manage false positives when identifying cyber threats
Intelligence 03/March/2021 Jupyter Notebooks for fun and cryptomining Criminals are taking advantage of weaknesses in the data science tool to mine cryptocurrencies
Web Application Security 24/February/2021 SQL Injection: There was a comma halfway How to efficiently exploit a Blind SQL Injection when the vulnerable application removes the character โ,โ (comma) from the request?
Detection Engineering 25/October/2023 False positives in threat detection Understand the need to create exceptions, adjust detection logic and rules, implement processes to handle alerts and manage false positives when identifying cyber threats
Intelligence 03/March/2021 Jupyter Notebooks for fun and cryptomining Criminals are taking advantage of weaknesses in the data science tool to mine cryptocurrencies
Web Application Security 24/February/2021 SQL Injection: There was a comma halfway How to efficiently exploit a Blind SQL Injection when the vulnerable application removes the character โ,โ (comma) from the request?