Zeek (formerly Bro): https://zeek.org/ - A powerful network traffic analyzer and intrusion detection system (IDS) that captures and analyzes full packet captures, enabling proactive threat hunting based on network behavior.
Suricata: https://suricata.io/ - Open-source network IDS/IPS engine that monitors network traffic for indicators of compromise (IoCs) and other suspicious activity, offering real-time threat detection and prevention.
Moloch: https://arkime.com/ - Large-scale full packet capture and search tool ideal for storing and analyzing massive amounts of network traffic data for retrospective threat investigations.
Watcher: https://github.com/thalesgroup-cert/Watcher - Open-source threat hunting platform built with Django and ReactJS, providing a centralized hub for collecting, analyzing, and visualizing threat data to streamline proactive threat hunting efforts.
TheHive Project: https://thehive-project.org/ - Open-source incident response platform that manages and responds to security incidents, integrating with various threat intelligence feeds for a holistic view of the threat landscape.
MISP: https://github.com/MISP/MISP - Threat intelligence sharing platform enabling secure collaboration and data exchange between organizations to combat cyber threats collectively.
Python Security Project: https://pypi.org/security/ - Extensive collection of open-source Python libraries for security researchers and developers, offering versatile tools for building custom security solutions and tools.
Saša Zdjelar joins us on this episode to dive into how organizations can manage supply chain risk, including the current challenges we face and how best to deal with them.
This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!
In this segment, we discuss topics related to physical security and social engineering. We also touch on the challenges and strategies for implementing effective security measures. The discussion highlights the importance of understanding the relationship between physical security and social engineering. The panel emphasizes the need for a compreh...