Threat Hunting I – Understanding Threat Hunting
Although Threat Hunting is nothing new, it is a very hot topic lately. Even if…Continue Reading
Threat Hunting II – Recommendations
An effective threat hunting is critical because it is hard to think like attackers and…Continue Reading
Open Threat Exchange
Open Threat Exchange is a threat intelligence platform from Alien Vault. It is not limited…Continue Reading
Creating IoCs with Mandiant IOCe
In “Open Threat Exchange” post we mentioned that shared IoCs by other parties on Open…Continue Reading
Data Collection with Redline
As we discuss before, Redline is a great tool for investigating endpoints. In this post,…Continue Reading
Searching for IoC with Redline
Redline is a free tool for investigation malicious activity through memory and file analysis. It…Continue Reading
Threat Hunting III – Pyramid of Pain
As we mentioned in the previous sessions, IoCs are crucial important for a proactive threat…Continue Reading
TTP-Based Threat Hunting – Why and How?
In its simplest definition, threat hunting is a process to identify whether adversaries reached to…Continue Reading