Dec. 8, 2023, 8 a.m. | Steffen Rogge

NVISO Labs blog.nviso.eu

Welcome, readers, to the first installment of our blog series “Preventing Exploitation and Abuse with the RPC Firewall”.In this post, we’ll delve into how to create rules for the RPC firewall and how to deploy them onto our servers.In the year 2024, we’ll release the second part of this series, where we’ll explore detection possibilities … Continue reading RPC or Not, Here We Log: Preventing Exploitation and Abuse with RPC Firewall

abuse blog blue team deploy exploitation firewall log logging our blog red team red teaming release rpc rules series servers siem threat hunting

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network Security Engineer

@ Meta | Menlo Park, CA | Remote, US

Security Engineer, Investigations - i3

@ Meta | Washington, DC

Threat Investigator- Security Analyst

@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC

Security Operations Engineer II

@ Microsoft | Redmond, Washington, United States

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States