• Jean-Christoph von Oertzen
  • Blog
  • Infosec glossary
  • Home
  • |
  • Archives: Security

Security

Webinar takeaway – Applying The Threat Hunter’s Runbook

My key takeaways threat hunting runbook Identify connection persistency Identify if there is a ...

Read More

Security

Webinar takeaway – Web Shell Intrusion Live Attack & Defend Demo

My key takeaways Webshells are often not recognized by AV solutions suggested mitigations: Latest ...

Read More

Security

Webinar takeaway – Tactical BurpSuite

My key takeaways AWS doesn’t allow to test from a workspace Testing inside seems ...

Read More

Security

Webinar takeaway – The Ins and Outs of RITA

My key takeaways RITA is made to detect beacons and long connections open source ...

Read More

Security

Webinar takeaway – Malware of the Day

My key takeaways "Malware of the Day" is about simulating one malware or exploit ...

Read More

Email, Security

Webinar takeaway – How to Detect and Respond to Business Email (M365) Compromise

My key takeaways BEC external-to-internal passes all technical security measures like SPF, DKIM and ...

Read More
Load More

Copyright 2025 Jean-Christoph von Oertzen - Privacy policy - Imprint