IoT Malware analysis project

IoT Malware analysis project

UnderDefense has completed a new IoT Security project. Our Malware analysis helped Israel startup to identify and Reverse Engineer new malware example that massively targets IoT devices. Read the full case study Read the full case study
Crypto markets & Smart-Contract Security

Crypto markets & Smart-Contract Security

UnderDefense has recently completed 2 complex security assessment projects for cryptocurrency marketplaces. Our elite team of ethical hackers provided Solidity based Smart-Contract code assessment as well as discovered critical security flows on Web and API version of...
Eset Remote Administrator App for Splunk

Eset Remote Administrator App for Splunk

About data visualization and Splunk apps Shortly about app App Description Summary Links About data visualization and Splunk apps The best method to explain the significance of information is to display it in a visual context. Recently we have created an add-on for...
How to Configure Log Sending from Cisco Firepower to Splunk [2024]

How to Configure Log Sending from Cisco Firepower to Splunk [2024]

In this article, we are going to describe the process of connecting Cisco FirePower Threat Defense with Splunk in the case of using the Cisco Firepower Management Center. The Main Reason to Connect CISCO Firepower eStreamer to Splunk SIEM Cisco ASA FirePower is Next...
Windows Event Collector orchestration 2

Windows Event Collector orchestration 2

Create a Group Policy Add WEC to the special user group Add read access to security logs for winRM services Restricted Group creation WinRM service configuration Summary Introduction As the continuation of the previous article, we are going to share information...