all InfoSec news
Sigma rule that monitors suspicious file creations on Exchange servers by the IIS server process
Oct. 5, 2022, 5:21 a.m. | /u/digicat
For [Blue|Purple] Teams in Cyber Defence www.reddit.com
[sigma/file\_event\_win\_exchange\_webshell\_drop\_suspicious.yml at master · SigmaHQ/sigma · GitHub](https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file_event/file_event_win_exchange_webshell_drop_suspicious.yml)
Sysmon:
[sysmon-config/sysmonconfig-export.xml at master · Neo23x0/sysmon-config · GitHub](https://github.com/Neo23x0/sysmon-config/blob/master/sysmonconfig-export.xml)
More from www.reddit.com / For [Blue|Purple] Teams in Cyber Defence
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
COMM Penetration Tester (PenTest-2), Chantilly, VA OS&CI Job #368
@ Allen Integrated Solutions | Chantilly, Virginia, United States
Consultant Sécurité SI H/F Gouvernance - Risques - Conformité
@ Hifield | Sèvres, France
Infrastructure Consultant
@ Telefonica Tech | Belfast, United Kingdom