#siem
Read more stories on Hashnode
Articles with this tag
Intro In this article, I will be going over how to setup an intentionally vulnerable virtual machine within Azure. We will then ingest the logs from...