Boost Your Threat Intelligence: Investigating IPs, Domains, etc for a Stronger Cybersecurity Defense

Поделиться
HTML-код
  • Опубликовано: 24 янв 2025

Комментарии • 10

  • @exosfear512
    @exosfear512 Год назад +3

    Glad you are still making these

  • @tbadi-Tonny
    @tbadi-Tonny Год назад

    Thanks for this series. Looking forward to shuffle

  • @marcing4287
    @marcing4287 6 месяцев назад

    Can cortex also process pre-defined list of emails ? And also integrate with Qualys for vulnerabilities ?

  • @xtheory
    @xtheory 9 месяцев назад

    What is the terminal app you’re using in this video?😊

  • @robertFontenot-q5z
    @robertFontenot-q5z 5 месяцев назад

    absolutely love this series. I don't think this works any longer though. Unless I am just missing something simple, it's just not working for me.

  • @mauriciob3334
    @mauriciob3334 Год назад

    is it mandatory to use the root_ca to create de jks?

    • @VarunTx
      @VarunTx Год назад

      Same doubt

    • @mauriciob3334
      @mauriciob3334 Год назад

      ​@@VarunTx it is not, it is mandatory for him because he is using the indexer of wazuh, if you are using the elasticseach in a container it is not necesary

    • @VarunTx
      @VarunTx Год назад

      @@mauriciob3334 Thank you!

  • @-Giuseppe
    @-Giuseppe Год назад +1

    I would love to see more about shuffle...