Threat Hunting I – Understanding Threat Hunting
Although Threat Hunting is nothing new, it is a very hot topic lately. Even if…
Threat Hunting II – Recommendations
An effective threat hunting is critical because it is hard to think like attackers and…
Open Threat Exchange
Open Threat Exchange is a threat intelligence platform from Alien Vault. It is not limited…
Creating IoCs with Mandiant IOCe
In “Open Threat Exchange” post we mentioned that shared IoCs by other parties on Open…
Data Collection with Redline
As we discuss before, Redline is a great tool for investigating endpoints. In this post,…
Searching for IoC with Redline
Redline is a free tool for investigation malicious activity through memory and file analysis. It…
Threat Hunting III – Pyramid of Pain
As we mentioned in the previous sessions, IoCs are crucial important for a proactive threat…
TTP-Based Threat Hunting – Why and How?
In its simplest definition, threat hunting is a process to identify whether adversaries reached to…