-
-
-
@EdwardsCP@mroytman@raesene@VZDBIR@riskio Not sure how "correlation with open vulns" works. Implies a scanner too, maybe? -
@EdwardsCP@dguido@raesene@VZDBIR it is correlated with a vuln scanner, and IOCs post data from alienvault and Dell MSP. -
@mroytman@EdwardsCP@raesene@VZDBIR ok, so scanner detects vuln, then IDS later detects exploit heading to same server = exploited -
@dguido@EdwardsCP@raesene@VZDBIR Publishing a follow up post with detailed methodology Monday too long for Twitter -
@mroytman@EdwardsCP@raesene I know, I want to go to sleep too. I'm glad you're discussing origins, looking forward to the post but... - 3 more replies
New conversation -
-
-
@gdbassett@mroytman@raesene@VZDBIR@riskio Given the relative size difference, I'm sure IDS/Scanner data dominated though? -
@gdbassett@mroytman@raesene Sigh, this is getting off track. Even with that data, all must be informed by how attackers exploit it. -
@gdbassett@mroytman@raesene That was the source of my original comment about that graph and others in that section.
End of conversation
New conversation -
-
@dguido wasn't that post 378 days ago?Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.