.

Threat Hunting

DPI Sensors – Get the Edge in Threat Hunting

As cyber attacks become increasingly sophisticated, traditional solutions based on known signatures often fall short allowing new malware and zero day attacks to penetrate...

THREAT HUNTING FOR INTERNAL RDP BRUTE FORCE ATTEMPTS

This post was originally published here by Matthew Hosburgh.In 2015, a targeted attack was discovered. Exposed by Cymmetria, the campaign was known as Patchwork. Their...

SETTING YOUR THREAT HUNTING CALENDAR FOR 2018

This post was originally published here by Kristina Sisk.What is your team hunting for in 2018? If you don’t know, how can you be...

THREAT HUNTING WITH BRO

This post was originally published here by Ryan Nolette.This blog is a quick overview of how I use Bro IDS for threat hunting.Specifically:Example queries...

THREAT HUNTING: BUY, BUILD, BEG OR BORROW

This post was originally published here by Sqrrl Team.What goes into running a top-notch SOC? Recently, we sat down with Taylor Lehmann, the CISO of Wellforce,...

SITUATIONAL-AWARENESS DRIVEN THREAT HUNTING

This post was originally published here by Ryan Nolette.For this example, I will limit my search to just high-value targets, such as the domain...

THREAT HUNTING FOR SUSPICIOUS FILE TYPES ON THE HOST

This post was originally published here by  Chris Sanders.In the first part of this series, I discussed how suspicious file types could lead to the discovery...

THREAT HUNTING THROUGH THE USE OF AN ISOLATION FOREST

This post was originally published here by Christopher McCubbin.In a recent Boston Bsides talk, David Bianco and I briefly mentioned the use of isolation forests to...

IS THREAT HUNTING-AS-A-SERVICE (THAAS) FOR YOU?

This post was originally published here by  Luis Maldonado.Today we are announcing an exciting new partnership with Deloitte in support of their Managed Threat...

THREAT HUNTING FOR EVIDENCE OF EAVESDROPPING

This post was originally published here by Matthew Hosburgh.We’ve all had the paranoia that someone is listening to our phone conversations. You mean you’ve...
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!