Here’s where I lace up my boots and take on the toughest defenders in the game of cybersecurity—armed with nothing but powerful KQL queries. Whether it’s a header to block threats or a perfect pass to uncover hidden vulnerabilities, these queries are my star players. So, sit back and enjoy the match as we score goals against cyber threats, one query at a time! On the other hand, if you are looking for the best KQL team ever, visit KQLSearch.com to discover the next KQL Golden Balls!
[{"id":325,"link":"https:\/\/sergioalbea.com\/rating-isp-to-detect-potential-attacks-and-iocs-sources\/","name":"rating-isp-to-detect-potential-attacks-and-iocs-sources","thumbnail":{"url":false,"alt":false},"title":"Rating ISP to detect potential attacks and IOCs sources","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Nov 23, 2024","dateGMT":"2024-11-23 18:43:17","modifiedDate":"2024-11-23 18:43:20","modifiedDateGMT":"2024-11-23 18:43:20","commentCount":"0","commentStatus":"closed","categories":{"coma":"Sin categor\u00eda","space":"Sin categor\u00eda"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":12},"status":"publish","excerpt":""},{"id":312,"link":"https:\/\/sergioalbea.com\/detect-pnp-devices-connected-to-my-endpoints\/","name":"detect-pnp-devices-connected-to-my-endpoints","thumbnail":{"url":false,"alt":false},"title":"Detect PnP devices connected to my Endpoints","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Oct 2, 2024","dateGMT":"2024-10-02 17:49:58","modifiedDate":"2024-10-02 17:50:40","modifiedDateGMT":"2024-10-02 17:50:40","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":32},"status":"publish","excerpt":""},{"id":308,"link":"https:\/\/sergioalbea.com\/detection-of-oof-messages-delivered-externally\/","name":"detection-of-oof-messages-delivered-externally","thumbnail":{"url":false,"alt":false},"title":"Detection of OOF messages delivered externally","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Oct 2, 2024","dateGMT":"2024-10-02 17:33:55","modifiedDate":"2024-10-02 17:33:57","modifiedDateGMT":"2024-10-02 17:33:57","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/email\/\" rel=\"category tag\">Email<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/email\/\" rel=\"category tag\">Email<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":29},"status":"publish","excerpt":""},{"id":264,"link":"https:\/\/sergioalbea.com\/detect-external-sources-scanning-my-exposed-devices\/","name":"detect-external-sources-scanning-my-exposed-devices","thumbnail":{"url":false,"alt":false},"title":"Detect External Sources scanning my exposed devices","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Sep 20, 2024","dateGMT":"2024-09-20 12:10:31","modifiedDate":"2024-09-20 12:10:34","modifiedDateGMT":"2024-09-20 12:10:34","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a>, <a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a> <a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":27},"status":"publish","excerpt":""},{"id":260,"link":"https:\/\/sergioalbea.com\/potential-threats-or-network-anomalies-related-to-icmp-inbound-connections\/","name":"potential-threats-or-network-anomalies-related-to-icmp-inbound-connections","thumbnail":{"url":false,"alt":false},"title":"Potential Threats or network anomalies related to ICMP Inbound Connections","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Sep 9, 2024","dateGMT":"2024-09-09 09:11:32","modifiedDate":"2024-09-09 09:14:24","modifiedDateGMT":"2024-09-09 09:14:24","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":58},"status":"publish","excerpt":""},{"id":258,"link":"https:\/\/sergioalbea.com\/non-supported-sense-agent-version-required-for-the-contain-user-action-by-attack-disruption\/","name":"non-supported-sense-agent-version-required-for-the-contain-user-action-by-attack-disruption","thumbnail":{"url":false,"alt":false},"title":"Non-supported Sense Agent version required for the\u00a0Contain User action\u00a0by Attack Disruption","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Sep 5, 2024","dateGMT":"2024-09-05 21:33:09","modifiedDate":"2024-09-05 21:33:12","modifiedDateGMT":"2024-09-05 21:33:12","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":0},"status":"publish","excerpt":""},{"id":256,"link":"https:\/\/sergioalbea.com\/methods-used-to-establish-secure-communication-over-insecure-channels\/","name":"methods-used-to-establish-secure-communication-over-insecure-channels","thumbnail":{"url":false,"alt":false},"title":"Methods used to establish secure communication over insecure channels","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Sep 5, 2024","dateGMT":"2024-09-05 21:29:36","modifiedDate":"2024-09-05 21:29:38","modifiedDateGMT":"2024-09-05 21:29:38","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a>, <a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a> <a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":30},"status":"publish","excerpt":""},{"id":253,"link":"https:\/\/sergioalbea.com\/success-sign-in-from-more-than-3-countries-in-1-day\/","name":"success-sign-in-from-more-than-3-countries-in-1-day","thumbnail":{"url":false,"alt":false},"title":"Success sign-in from more than 3 countries in 1 day","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Ago 29, 2024","dateGMT":"2024-08-29 21:28:04","modifiedDate":"2024-08-29 21:28:34","modifiedDateGMT":"2024-08-29 21:28:34","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/identities\/\" rel=\"category tag\">Identities<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/identities\/\" rel=\"category tag\">Identities<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":10},"status":"publish","excerpt":""},{"id":251,"link":"https:\/\/sergioalbea.com\/enriching-cvedevices-tables-with-cve-mitre-data\/","name":"enriching-cvedevices-tables-with-cve-mitre-data","thumbnail":{"url":false,"alt":false},"title":"Enriching CVEDevices tables with CVE Mitre Data","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Ago 29, 2024","dateGMT":"2024-08-29 18:22:46","modifiedDate":"2024-08-29 18:22:49","modifiedDateGMT":"2024-08-29 18:22:49","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/devices\/\" rel=\"category tag\">Devices<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":57},"status":"publish","excerpt":""},{"id":226,"link":"https:\/\/sergioalbea.com\/detection-of-spoofed-emails\/","name":"detection-of-spoofed-emails","thumbnail":{"url":false,"alt":false},"title":"Detection of spoofed Emails","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Ago 29, 2024","dateGMT":"2024-08-29 16:27:14","modifiedDate":"2024-08-29 17:04:47","modifiedDateGMT":"2024-08-29 17:04:47","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/email\/\" rel=\"category tag\">Email<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/email\/\" rel=\"category tag\">Email<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":12},"status":"publish","excerpt":""},{"id":223,"link":"https:\/\/sergioalbea.com\/detecting-potential-malicious-isps-and-their-ips-associated\/","name":"detecting-potential-malicious-isps-and-their-ips-associated","thumbnail":{"url":false,"alt":false},"title":"Detecting Potential Malicious ISP's and their IP's associated","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Ago 29, 2024","dateGMT":"2024-08-29 16:08:52","modifiedDate":"2024-08-29 17:05:57","modifiedDateGMT":"2024-08-29 17:05:57","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":31},"status":"publish","excerpt":""},{"id":219,"link":"https:\/\/sergioalbea.com\/communication-at-risk-due-to-the-encryption-algorithms-ciphers-in-use\/","name":"communication-at-risk-due-to-the-encryption-algorithms-ciphers-in-use","thumbnail":{"url":false,"alt":false},"title":"Communication at risk due to the encryption algorithms (Ciphers) in use","author":{"name":"sergioalbea","link":"https:\/\/sergioalbea.com\/author\/sergioalbea\/"},"date":"Ago 28, 2024","dateGMT":"2024-08-28 19:56:00","modifiedDate":"2024-08-29 17:05:07","modifiedDateGMT":"2024-08-29 17:05:07","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>","space":"<a href=\"https:\/\/sergioalbea.com\/category\/network\/\" rel=\"category tag\">Network<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":17},"status":"publish","excerpt":""}]