Silent Wazuh — tuning, event minimization, notifications in Telegram
Recently, I finally got around to studying Wazuh - to make the learning process useful, I set it up for testing in a small hospital and identified the tasks it should…
Recently, I finally got around to studying Wazuh - to make the learning process useful, I set it up for testing in a small hospital and identified the tasks it should…
Immediately after the laws on changing the laws on liability for improper handling of personal data were passed, we at IDX, like everyone who deals with personal data,…
The Gramota.ru portal claims that "A layout is an object that accurately reproduces in a reduced size or full size any other object."
Hello, tekkix! We at the Security Analysis Department of the "Astra Group" recently had our first experience participating in the Big Mathematical Workshop, and we would…
Hello! Today we continue to implement encryption. In this article, we will look at the Magma cipher algorithm, which was developed and used in the USSR.
Over the past decade, we have realized that manually performing investigation and response processes limits us in speed, which greatly affects our ability to handle the…
On the vast expanses of the network, you can find many publications on the topic of conducting various pentests: stages, tools used, results obtained, reporting, etc.
Why securely erase data at all? The main thing is that the user cannot retrieve it through the DBMS interface. Who cares about data remnants in files, it's not a problem.…
In this article, I will talk about a relevant issue for many — migration from UserGate 6 to version 7. After the departure of foreign developers from the Russian market,…
There are currently many debates and discussions about the future of C++.
The very first Samsung rugged device appeared back in 2011. It looks like a reinforced case and a replaceable battery, which extends the life of the smartphone, but it's…
How does a VPN work? How does a service bundle work for reliable and secure data transmission between branches and remote employees? What is quantum communication?
Hello tekkix, my name is Stanislav Gribanov, I am the product manager of the NDR group of companies "Garda". I have been working in information security since 2010, and…
We continue our series of articles on the types and methods of data collectors from endpoints, or, as they are commonly called, agents. In the first article, we got acquainted…
Attacks using the long-patched WinRAR vulnerability remain relevant for many companies. Let's figure out how a typical attack works, how attackers bypass antivirus software,…
Have you ever hidden something inside a PNG?
If you follow the latest news in the field of IT security, you may have noticed an increase in the number of attacks on the network infrastructure of Linux systems. Among…
In recent years, there has been a trend towards the use of cloud computing, with companies increasingly preferring it when developing their information infrastructure.