DShield Traffic Analysis using ELK, (Thu, Mar 6th)
Using the Kibana interface, sometimes it can be difficult to find traffic of interest since there can be so much of it. The 3 logs used for traffic analysis are cowrie, webhoneypot and the firewall logs. Other options to add to the honeypot are...
China's Silk Typhoon APT Shifts to IT Supply Chain Attacks
The nation-state threat group has been breaching providers of remote management tools, identity management providers, and other IT companies to access networks of targeted entities, according to Microsoft.
Rate limit Management and Troubleshooting with the new Meraki “API Analytics Dashboard”
Ever hit an API rate limit unexpectedly? Or struggled to track which integrations are consuming the most API calls? We know that feeling—API troubleshooting can be frustrating when there’s little visibility into what’s happening behind the scenes...