Hunting The Empire
Empire tool is one of the post-exploitation frameworks with an HTTP module; attackers can use it for various malicious […]
Empire tool is one of the post-exploitation frameworks with an HTTP module; attackers can use it for various malicious […]
This post is part two of Event Categories and Recommended UseCase, you can see part one : The guidelines provided […]
How does Splunk prioritize and merge the configuration files? When editing configuration files, it is important to understand how Splunk […]
Incident-specific playbooks provide incident managers and stakeholders with a consistent approach to follow when remediating a cyber incident. Playbooks describe […]
Prior to having a presence on the network, attackers are unlikely to be able to disguise web shell traffic as […]
The guidelines provided in this article help SOC professionals in understanding and respond to security monitoring requirements in a more […]
Understanding Intelligence Intelligence is the processed and classified information that is elucidated by expert analysts. It is extracted from all […]
Tools To Rapidly Deploy A Threat Hunting Capability On Azure Sentinel That Leverages Sysmon And MITRE ATT&CK Sentinel ATT&CK aims […]