As mentioned by Bradley on the IOK repository, one of the rules was cited in a ZScaler report!
Glad to see the different applied uses IOK has to offer, and how versatile it can become for different aspects of Cyber Security
As mentioned by Bradley on the IOK repository, one of the rules was cited in a ZScaler report!
Glad to see the different applied uses IOK has to offer, and how versatile it can become for different aspects of Cyber Security