Date Author Title
2024-11-26Jesse La Grew[Guest Diary] Using Zeek, Snort, and Grafana to Detect Crypto Mining Malware
2023-03-28Jesse La GrewNetwork Data Collector Placement Makes a Difference
2023-02-12Jesse La GrewPCAP Data Analysis with Zeek
2022-02-03Johannes UllrichKeeping Track of Your Attack Surface for Cheap
2021-04-10Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK