New Feature in AWS: Traffic Mirroring

New Feature in AWS: Traffic Mirroring

New Feature in AWS: Traffic Mirroring Now security analysts are able to collect data fast and flexibly with a new feature. Traffic Mirroring in AWS has given an ability to transfer the traffic to a SIEM (like Splunk) and analyse it. This is targeted for cases when you...
UD team at NoNameCon 2019: outcomes and materials

UD team at NoNameCon 2019: outcomes and materials

UD team at NoNameCon 2019: outcomes and materials NoNameCon was epic this year! We loved to see the growth of our community and contribute with speeches sharing our expertise! There were 3 speakers from UnderDefense, 2 Villages and 12 UD teamers who attended the...
Catch them! Secrets to detect attackers Maltese workshop

Catch them! Secrets to detect attackers Maltese workshop

Catch them! Secrets to detect attackers Maltese workshop Malta Blockchain Summit is a place where business representatives from Crypto Marketplaces, Online gaming, and gambling & Financial Technology companies meet up to network and receive up to date information....
IoT attack simulation and ways to protect

IoT attack simulation and ways to protect

IoT attack simulation and ways to protect  Internet of Things rapidly changes lives of millions of people. The ramp up of technology also comes with security risks that are usually underestimated. In today’s world of “always on” technology and not enough security...
Anomali and UnderDefense partnership

Anomali and UnderDefense partnership

Anomali and UnderDefense partnership Anomali is one of the most comprehensive Threat Intelligence Platforms. It boosts the reaction of analysts in Security Operations Center to unknown threats and investigate incidents faster. We are proud to have such a strong...
Mac based antimalware training

Mac based antimalware training

Mac antimalware training Apple customers believe that no adversaries can hack their personal data or access important files. We bust this myth about perfectly secure MacOS devices! During our Security Awareness training, we demonstrate how anyone can break this...

Pin It on Pinterest