I created these dashboards for splunk to detect some attacks:
Apache Error Log Monitoring Dashboard
⛶version="1.1" theme="dark">
Apache Error Log Monitoring Dashboard
Monitors Apache ...
Introduction
When we talk about security in the context of an application, we immediately think of three aspects:
Vulnerabilities (XSS…)
Authentication
Roles/permissions
In this article, we...
The Growing Imperative of OT Patch Management
Operational Technology (OT) underpins the world’s critical infrastructure, think power plants humming with electricity, water treatment facilit...
INTRODUCTIONWHAT IS THE CATALYST-CLI???
Running many AVSs on different platforms can be confusing and time-consuming. Each one works a bit differently and needs constant updates. For node operators, t...
When managing remote servers, SSH (Secure Shell) is the standard for encrypted and secure communication. However, relying on passwords for SSH access leaves your systems vulnerable to:
Credential stuf...
This is a submission for the Permit.io Authorization Challenge: Permissions Redefined
What I Built
Demo
Project Repo
My Journey
Using Permit.io for Authoriz...
This is a submission for the Permit.io Authorization Challenge: Permissions Redefined
What I Built
Demo
Project Repo
My Journey
Using Permit.io for Authoriz...