Threat and vulnerability management
Identifying and using available security knowledge to mitigate and manage potential adversary actions.
Nessus
YARA
THM Capture The Flag

Identifying and using available security knowledge to mitigate and manage potential adversary actions.
Nessus
YARA
THM Capture The Flag