Como Funciona o NIST — Cybersecurity FrameworkUma análise compreensiva dos métodos utilizados durante o procedimento de resposta a incidentesMar 31, 2023Mar 31, 2023
PrintNightmare Analysis - A LetsDefend ChallengePrintNightmare Vulnerability AnalysisFeb 12, 2023Feb 12, 2023
Email Analysis — Tips & ResourcesTips and resources on how to have a better understanding of phishing attacks using email messages.Jan 2, 2023Jan 2, 2023
E-mail Analysis - A LetsDefend ChallengeAnalysis of a suspicious e-mail file to find more information about a possible threat.Dec 20, 2022Dec 20, 2022
PDF Analysis - A LetsDefend ChallengeAnalysis of a PDF file in order to detect if there’s any signs of malicious behavior and possible indicators of compromise.Dec 12, 2022Dec 12, 2022
Disclose The Agent - A LetsDefend ChallengeHi there! In order to properly inaugurate this page, we’ll be disclosing the agent — A LetsDefend Challenge.Nov 28, 2022Nov 28, 2022