Staff
Since ‎01-31-2023
3 hours ago

My Stats

  • 13 Posts
  • 1 Solutions
  • 9 Likes given
  • 22 Likes received

tameri's Bio

Badges tameri Earned

View all badges

Recent Activity

In this post, I will show you how to use Mandiant Security Validation (MSV) and threat intelligence from Virustotal to validate whether your endpoint security controls can detect data exfiltration using curl on windows. Your task is to validate wheth...
In this post, I will show you how to use Mandiant Security Validation (MSV) and available exploits to validate whether your internet security controls can detect and/or prevent a Chrome browser exploit. As a Network Security Administrator or Red Team...
In this post, I will show you how to use VirusTotal and Mandiant Security Validation to validate that your internet security controls can detect and/or prevent command and control communication for a malware sample. As a security analyst, you have be...
Zeek(used to be Bro) is an open-source Network Security Monitor that can be used for Detection System and network traffic analysis framework. Zeek can generate real-time alerts, data logging for further investigation, and automatic program execution ...
This post is a continuation of Part 1 - Evaluating Security Stack Resilience against Attack use cases - a suggested framework. The following photos will show some of the use cases (or playbooks) that demonstrate how Mandiant Security Validation (MSV)...