Category: Attacking

Categories
Attacking Detection

How to Build Your Own Cybersecurity Test Lab?

There are 3 main requirements to create a cyber security lab environment. These are: Test environment Attack simulation Detection tools In this article, we have listed free tools / resources that you can use to create your own lab environment. Additionally, if you are looking for a blue team online lab, you can visit letsdefend.ioRead More

Categories
Attacking Detection

Attacking SIEM with Fake Logs

In order to ensure to cyber security of an organization, the logs of the systems it owns must be collected, analyzed and repeated continuously. For provide the continuous of the process, monitoring systems can be installed. The fact that what is happening inside is being followed reduces the attack area of ​​the attackers. But itRead More