Network Security Channel
2.57K subscribers
5.33K photos
3.42K videos
5.56K files
4.44K links
شروع از سال 1395
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
Cyber risk is calculated by considering the identified security threat, its degree of vulnerability, and the likelihood of exploitation. At a high level, this can be quantified as follows:
Cyber risk = Threat x Vulnerability x Information Value

In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework.

How to Measure Anything in Cybersecurity Risk
Second Edition
DOUGLAS W. HUBBARD
RICHARD SEIERSEN
Logo: Wiley
Copyright © 2023 by John Wiley & Sons, Inc. All rights reserved.
https://lnkd.in/euz7HM8Y

-Business Secure Continuity-
1402.03.21
#cybersecurity #job #training #help #university #future #security #business #sansinstitute #eccouncil #iso22301 #nistcybersecurityframework #isaca #cissp
#isc2 #redteam #blueteam #csirt #forensics #splunksecurity #siem #otsecurity

@Engineer_Computer
#DiyakoSecureBow

No Network Access
Sandboxes don't have network access, so if a malicious document can compromise one, it can't phone home

Optional OCR
Dangerzone can optionally OCR the safe PDFs it creates, so it will have a text layer again

Reduced File Size
Dangerzone compresses the safe PDF to reduce file size

Open Docs Safely
After converting, Dangerzone lets you open the safe PDF in the PDF viewer of your choice, which allows you to open PDFs and office docs in Dangerzone by default so you never accidentally open a dangerous document

HOW IT WORKS
Dangerzone works like this: You give it a document that you don't know if you can trust (for example, an email attachment). Inside of a sandbox, Dangerzone converts the document to a PDF (if it isn't already one), and then converts the PDF into raw pixel data: a huge list of of RGB color values for each page. Then, in a separate sandbox, Dangerzone takes this pixel data and converts it back into a PDF.

#cyberresilience #event #stage #business #help #siem #threatintelligence #threatdetection #threathunting #threatvulnerabilitymanagement #threatanalysis #network #data #pdf #email #like
1764146008730.pdf
4.5 MB
🧠 Log Analysis + Wazuh Integration — Hands-On Mini Lab for Blue Teamers 🚀

Just finished going through this practical guide on Linux & Windows log analysis with Wazuh and it’s one of the clearest step-by-step walkthroughs I’ve seen for juniors and SOC beginners.

Here’s what you’ll practice inside the PDF:

🔹 Linux Log Analysis

Exploring key log files under /var/log (boot, cron, secure, mail, httpd, messages)
Verifying package installation logs via apt
Reviewing firewall activity with UFW logs

🔹 Windows Event Log Analysis

Enabling audit policies via Local Security Policy
Using Event Viewer to track security events (e.g. 4625, 4776)
Simulating RDP brute-force attempts and interpreting the resulting logs

🔹 Wazuh Integration (SIEM)

Configuring ossec.conf for Linux & Windows log collection
Validating events in the Wazuh dashboard (Threat Hunting & Discover views)
Correlating firewall, package, and authentication events across hosts

🎯 Great for:
Students, SOC interns, junior analysts, and anyone who wants a lab-style intro to log analysis + Wazuh without getting lost in theory.

📘 I’ve attached the PDF — worth saving if you’re building your Blue Team fundamentals or preparing for SOC roles.

What other SIEM or log analysis topics would you like to see broken down like this?

#Wazuh #SIEM #LogAnalysis #SOCAnalyst #BlueTeam #DFIR #Linux #WindowsSecurity #CyberSecurity #ThreatHunting

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
👍32❤‍🔥1🔥1