InAnton on SecuritybyAnton ChuvakinBaby ASO: A Minimal Viable Transformation for Your SOCOne pattern I spotted after looking at the evolution of IT and security organizations over the years, including my time at Gartner is…Apr 19Apr 19
InMITRE ATT&CK®byAmy L. RobertsonATT&CK 2024 RoadmapEnhancing usability, expanding scope, optimizing defensesApr 181Apr 181
Bank SecurityMastering Cyber Threat Intelligence with ObsidianUtilize Obsidian to transform your CTI dataset and uncover unprecedented connectionsMar 162Mar 162
Darek Bareckik8spacket is fully based on eBPF right nowk8spacket uses eBPF tracepoint and Traffic Control qdisc filters to collect information about TCP traffic and TLS connection metadata.Mar 91Mar 91
InSystem WeaknessbyDavid MerianHack eBPF, Own LinuxThis feature for Linux kernels, eBPF (Extended Berkeley Packet Filter) is “technology that makes programming the kernel flexible, safe, and…Sep 5, 2023Sep 5, 2023
InDetect FYIbyKostasEDR Telemetry Project: A Comprehensive ComparisonEndpoint Detection and Response (EDR) products have become essential to organizations’ cybersecurity strategies. As a result, understanding…Apr 19, 20237Apr 19, 20237
InSystem WeaknessbyAshish BansalHunt them in WindowsWhat is Windows Event Log?Jan 29, 2023Jan 29, 2023
InAWS in Plain EnglishbySena YakutHacking AWS Account via AWS Lambda SSRFServer-side request forgery (SSRF) attack is used for abusing functionality on the server to read or update internal resources. The main…Mar 25, 20235Mar 25, 20235
InMITRE-EngenuitybyJon Baker2023 R&D Roadmap to Advance Threat-Informed DefenseWritten by Jon Baker, Maggie MacAlpine, andApr 13, 2023Apr 13, 2023
InMicrosoft AzurebyAndre Camillo, CISSPHow to use MITRE’s Top ATT&CK Techniques tool — MITRE tools for Threat Informed DefenseBy now we should all be aware of MITRE and their many different Frameworks for Threat-Informed Defense.Aug 8, 2022Aug 8, 2022
InAnton on SecuritybyAnton ChuvakinGoogle Cybersecurity Action Team Threat Horizons Report #6 Is Out!This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our sixth Threat…Apr 13, 2023Apr 13, 2023
Invictus Incident ResponseEmail Forwarding Rules in Microsoft 365The ultimate guide to analysing and understanding email forwarding rules in the Unified Audit Log (UAL)Feb 20, 2023Feb 20, 2023
SIMKRAThreat Group Royal — An Analysis with Tidal Community Edition PlatformA how you can develop more transparency and visibility regarding threat actor & ransomware groups with free available, community driven…Feb 11, 2023Feb 11, 2023
InInfoSec Write-upsbyAdam GossThreat Hunting II: Environment SetupWelcome back to part II of this series on threat hunting! (apologies for the delay).Oct 26, 2022Oct 26, 2022
InSystem WeaknessbyDavid MerianChatGPT Powered Malware Bypasses EDRIn research by Jeff Sims at HYAS, he creates “Blackmamba,” an “AI synthesize polymorphic keylogger” that uses python to modify its program…Mar 13, 20231Mar 13, 20231
InPalantir BlogbyPalantirDemocratizing Security DetectionSecurity detection programs face significant scaling challenges. This post shares learnings and suggests actionable detection strategies.Jun 2, 20221Jun 2, 20221
InMicrosoft AzurebyAndre Camillo, CISSPHunting for Anomalous Identity Usage behaviour with MITRE ATT&CK using Microsoft Defender for…TL; DR: Identity Anomaly detection — how it works and more below.Oct 17, 20221Oct 17, 20221