Skip to content
Be4Sec
An Information Security Blog
Primary Navigation Menu
Menu
  • Home
  • News
  • Architectural
  • Red Team
  • Blue Team
  • SecOps

Threat Hunting

By: be4sec
On: 25 July 2021
Threat Hunting I – Understanding Threat Hunting

Threat Hunting I – Understanding Threat Hunting

Although Threat Hunting is nothing new, it is a very hot topic lately. Even if…Continue Reading

Threat Hunting II – Recommendations

Threat Hunting II – Recommendations

An effective threat hunting is critical because it is hard to think like attackers and…Continue Reading

Open Threat Exchange

Open Threat Exchange

Open Threat Exchange is a threat intelligence platform from Alien Vault. It is not limited…Continue Reading

Creating IoCs with Mandiant IOCe

Creating IoCs with Mandiant IOCe

In “Open Threat Exchange” post we mentioned that shared IoCs by other parties on Open…Continue Reading

Data Collection with Redline

Data Collection with Redline

As we discuss before, Redline is a great tool for investigating endpoints. In this post,…Continue Reading

Searching for IoC with Redline

Searching for IoC with Redline

Redline is a free tool for investigation malicious activity through memory and file analysis. It…Continue Reading

Threat Hunting III – Pyramid of Pain

Threat Hunting III – Pyramid of Pain

As we mentioned in the previous sessions, IoCs are crucial important for a proactive threat…Continue Reading

TTP-Based Threat Hunting – Why and How?

TTP-Based Threat Hunting – Why and How?

In its simplest definition, threat hunting is a process to identify whether adversaries reached to…Continue Reading

Bunu paylaş:

  • Tweet

Like this:

Like Loading...
2021-07-25

Subscribe to Blog via Email

Join 30 other subscribers

My Tweets

Keep this blog going

Bitcoin Network: 1MC88cj8ZAHyizPzYKShEcTNcpYZtGS7ep

  • 48,119 hits

Designed using Magazine News Byte. Powered by Powered by WordPress.com.

%d bloggers like this: