UnderDefense Blog

Effortless Splunk Universal Forwarders update with Ansible

Effortless Splunk Universal Forwarders update with AnsibleIntroduction Are you familiar with a pain of trying to install or update a large number of Splunk universal forwarders using only Splunk toolkit? It seems impossible. That is where the work of “configuration...

Fraud Detection Speech at EBA

Fraud Detection Speech at EBA UnderDefense team has attended a Breach&Fraud.IT meeting, which was organized by the European Business Association. Our CEO Nazar Tymoshyk and PM Mykhailo Hordych have presented there a speech about Data Breach Incident and its...

Spunk-based project on fraud detection investigation

Spunk-based project on fraud detection investigation Our team has detected fraudulent activity on the employee's side in our client’s company from the telecommunications sector. Splunk helped us to process all the data and capture suspicious actions. We have collected...

New Gen SIEM Tool development

New Gen SIEM Tool development What we have done: We have developed from our US MSSP client a reliable, fast and easy-to-use solution for Security Analysts and CISOs which helps to collect, per-process and forward logs for further analysis. Its main benefits: a remote...

Critical vulnerability in Linux and Mac

libssh vulnerability: Critical flaw in Linux and Mac SSH/SFTP services A critical vulnerability has been discovered in libssh - the implementation library for Secure Shell (SSH) that could allow anyone connect to computers remotely without knowing your password....

Top 3 research and rating platforms for cybersecurity

Top 3 research and rating platforms for cybersecurity The first step our potential customers take is visiting of the websites with independent ratings, reviews, and feedbacks online to check the quality, excellence, and professionalism of a vendor or service provider...

The best penetration test for your business

The best penetration test for your business. If you have decided that penetration test (an authorized simulated attack on a computer system, performed to evaluate the security of the system) is what your business needs, next step will be to choose its type.We will...

UnderDefense received the 3d place at SecOps Europe in 2018

UnderDefense received the 3d place at SecOps Europe in 2018 Our engineers had some practical experience in reacting to Incident Response at SecOps Europe in 2018. They developed and enhancined cybersecurity awareness in offensive and defensive sides and took part in...

Windows 10 Start menu

Windows 10 Start menu About AppLocker Creating AppLocker rules Summary Introduction Recently our security team discovered several issues with Windows 10 (Enterprise and Education versions) in Active Directory domain. We will try to describe how it all started, below....

UnderDefense at AGS SIGMA conference

UnderDefense at AGS SIGMA conferenceOur CEO Nazar Tymoshyk, and Head of BD Viktoria Miliar visited another great event in Kyiv. Both represented UnderDefense and our trusted partners Kyte Consultants Ltd at the annual summit #AGS SIGMA conference in Kyiv. Over two...

UnderDefense’s engineer unlocked Splunk certifications

UnderDefense's engineer unlocked Splunk certifications Consultant I level  We are pleased to be a Spunk partner and now our security analysts are awarded and holding Splunk certifications.  Slunk Inc. is a company producing software for searching, monitoring, and...

IoT Malware analysis project

IoT Malware analysis project UnderDefense has completed a new IoT Security project. Our Malware analysis helped Israel startup to identify and Reverse Engineer new malware example that massively targets IoT...

Crypto markets & Smart-Contract Security

Crypto markets & Smart-Contract Security UnderDefense has recently completed 2 complex security assessment projects for cryptocurrency marketplaces. Our elite team of ethical hackers provided Solidity based Smart-Contract code assessment as well as discovered...

Eset Remote Administrator App for Splunk

Eset Remote Administrator App for Splunk About data visualisation and Splunk apps Shortly about app App Description Summary Links About data visualization and Splunk apps The best method to explain the significance of information is to display it in a visual context....

Windows Event Collector orchestration 2

Windows Event Collector orchestration Create a Group Policy Add WEC to the special user group Add read access to security logs for winRM services Restricted Group creation WinRM service configuration Summary Introduction As the continuation of the previous article, we...

Windows Event Collector orchestration

Windows Event Collector orchestration Different Methods of log collection Splunk Universal Forwarder VS WEC How it works (Solution overview) Installation description Subscription creation process Summary Introduction This blog is one of many in a series that will...

Splunk Add-on for Eset Remote Administrator

Splunk Add-on for Eset Remote Administrator Development. How to use it Summary Development First of all we need to install Splunk Add-on builder. I prefer to install it from internal splunk shop in Splunk Enterprise. Go to Manage Apps and click Browse more apps   Use...

Pin It on Pinterest