Skip to content
  • Emergency Help!+1212-226-3126
  • All
  • Eneterprise security (SIEM)
  • SOAR
  • splunk
  • Splunk Eneterprise
  • UBA
Login Sign Up
  • Home
  • Courses
    • Splunk
      • Eneterprise
      • SOAR
      • UBA
      • Eneterprise security (SIEM)
  • Blogs
  • FAQ Page
  • About
  • Contact
0
0 $0.00
  • Your cart is empty
  • Home
  • Courses
    • Splunk
      • Eneterprise
      • SOAR
      • UBA
      • Eneterprise security (SIEM)
  • Blogs
  • FAQ Page
  • About
  • Contact
HomeOur Blogs
UseCase

Hunting The Empire

  • November 28, 2024
  • by Mohammad Ghanbari
  • 2 minutes read

  Empire tool is one of the post-exploitation frameworks with an HTTP module; attackers can use it for various malicious […]

UseCase

Event Categories and Recommended UseCase (Part two)

  • November 28, 2024
  • by Mohammad Ghanbari
  • 4 minutes read

This post is part two of Event Categories and Recommended UseCase, you can see part one : The guidelines provided […]

Splunk Enterprise

Splunk Configuration file precedence

  • November 28, 2024
  • by Mohammad Ghanbari
  • 5 minutes read

How does Splunk prioritize and merge the configuration files? When editing configuration files, it is important to understand how Splunk […]

playbook

Malware Playbook

  • November 28, 2024
  • by Mohammad Ghanbari
  • 8 minutes read

Incident-specific playbooks provide incident managers and stakeholders with a consistent approach to follow when remediating a cyber incident. Playbooks describe […]

UseCase

Splunk Queries for Detecting Anomalous URIs in Web Traffic

  • November 28, 2024
  • by Mohammad Ghanbari
  • 5 minutes read

Prior to having a presence on the network, attackers are unlikely to be able to disguise web shell traffic as […]

UseCase

Event Categories and Recommended UseCase(Part1)

  • November 28, 2024
  • by Mohammad Ghanbari
  • 3 minutes read

The guidelines provided in this article help SOC professionals in understanding and respond to security monitoring requirements in a more […]

Threat Intelligence

Understanding Cyber Threat Intelligence

  • November 28, 2024
  • by Mohammad Ghanbari
  • 4 minutes read

Understanding Intelligence Intelligence is the processed and classified information that is elucidated by expert analysts. It is extracted from all […]

Threat Intelligence

Sentinel-Attack

  • November 28, 2024
  • by Mohammad Ghanbari
  • 1 minute read

Tools To Rapidly Deploy A Threat Hunting Capability On Azure Sentinel That Leverages Sysmon And MITRE ATT&CK Sentinel ATT&CK aims […]

Categories

  • playbook (1)
  • Splunk Enterprise (1)
  • Threat Intelligence (2)
  • UseCase (4)

Recent Post

November 28, 2024

Hunting The Empire

November 28, 2024

Event Categories and Recommended UseCase (Part two)

November 28, 2024

Splunk Configuration file precedence

November 28, 2024

Malware Playbook

Tags

anti-spam antivirus cti detection detection rule Incident Responce index time rule search time soc splunk web shell

When An Unknown Printer Took Galley Of Type And Scrambled It To Make Pspecimen Bookt Has.

  • 463 7th Ave, NY 10018, USA
  • +123-88-9900-456

Resources

  • About
  • Contact
  • Refund
  • Help Center
  • Returns Policy
  • Term Conditions

Courses

Join Our Newsletter

Nown Printer Took Galley Type And Scrambled It To Make Following With Us
Subscription Form

We Only Send Interesting And Relevant Emails.

© 2024 web-seven. All Rights Reserved by web seven
  • Privacy Policy
  • Term Conditions
×
You must be logged in before using WishList. To login click here