How do threat intelligence researchers acquire breach data without breaking the law? [closed]

We use several threat intelligence tools at my work which alerts us of breach data AND shows us the plaintext contents of these breaches. However, when I investigate the source the breaches are almost always for sale by hackers. The ones t… Continue reading How do threat intelligence researchers acquire breach data without breaking the law? [closed]

Is there any quick or automated to way to check the version of PHP running on a remote server?

Currently running a vulnerability assessment. However, the IP I was provided is a load balancer and the client only wants to test one of the sites running on the load balancer. The vulnerabilities I have found are all PHP related. How can … Continue reading Is there any quick or automated to way to check the version of PHP running on a remote server?

Posted in PHP

In Splunk Enterprise Security Intelligence Downloads portion, what exactly does the "Fields" portion mean?

Trying to configure a download of MISP IoCs in Splunk ES, under Intelligence Downloads. It’s working for IPs but I can’t figure out how to tell Splunk that the feed contains more than just IPs, for example domains and hashes. From the docu… Continue reading In Splunk Enterprise Security Intelligence Downloads portion, what exactly does the "Fields" portion mean?