all InfoSec news
SOC173 — Follina 0-Day Detected
Jan. 16, 2024, 5:30 p.m. | Elnur Badalov
System Weakness - Medium systemweakness.com
SOC173 — Follina 0-Day Detected
Event ID: 123
Platform: LetsDefend
Alert
EventID : 123
Event Time : Jun, 02, 2022, 03:22 PM
Rule : SOC173 - Follina 0-Day Detected
Level : Security Analyst
Source Address : 172.16.17.39
Hostname : JonasPRD
File Name : 05-2022-0438.doc
File Hash : 52945af1def85b171870b31fa4782e52
File Size : 10.01 Kb
AV Action : Allowed
Alert Trigger Reason : msdt.exe executed after Office document
File (Password:infected) : Download
Based on the information provided in this alert, the …
blue team cybersecurity incident response lets-defend zero-day
More from systemweakness.com / System Weakness - Medium
Spring Boot Integration Shiro Quick Start Demo
1 day, 11 hours ago |
systemweakness.com
A Deep Dive into Network Security Threats
1 day, 11 hours ago |
systemweakness.com
Defensive Security: Installing PHPIDS on LAMP Servers
1 day, 11 hours ago |
systemweakness.com
TryHackMe Network Services Writeup
1 day, 11 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg
@ Hifield | Strasbourg, France
Lead Security Specialist
@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas
Consultant SOC / CERT H/F
@ Hifield | Sèvres, France