Threat Hunters Corner: Network TTP Hunting with EDR Data

Threat Hunters Corner: Network TTP Hunting with EDR Data
Oct 25, 2024
2
min read
Threat Hunters Corner: Understanding T1543 - Create or Modify System Processes

Threat Hunters Corner: Understanding T1543 - Create or Modify System Processes
Oct 18, 2024
3
min read
Snitches Get Stitches – Mitre ATT&CK for Insider Threat Detection

Snitches Get Stitches – Mitre ATT&CK for Insider Threat Detection
Aug 26, 2024
1
min read
Sharing is Caring – Novel SharePoint Phishing Campaign

Sharing is Caring – Novel SharePoint Phishing Campaign
Jul 17, 2024
3
min read
I Spy a Ransomware Attack

I Spy a Ransomware Attack
Jul 16, 2024
2
min read
Pyramid of Pain - You Can't Tie Your Shoes That Way

Pyramid of Pain - You Can't Tie Your Shoes That Way
Jul 02, 2024
3
min read
Big Brother Hacker - Attack Reconnaissance

Big Brother Hacker - Attack Reconnaissance
Jun 05, 2024
5
min read
Navigating Skynet with MITRE ATLAS

Navigating Skynet with MITRE ATLAS
May 20, 2024
2
min read
Master of Disguise 2: The Art of ReDirection

Master of Disguise 2: The Art of ReDirection
May 09, 2024
2
min read
Master of Disguise: URL Edition

Master of Disguise: URL Edition
Apr 18, 2024
5
min read
Cloudy With a Chance of Credit Card Theft

Cloudy With a Chance of Credit Card Theft
Mar 07, 2024
3
min read
From Zero to One: A Threat Hunting Training Montage (Part 1)

From Zero to One: A Threat Hunting Training Montage (Part 1)
Jan 11, 2024
3
min read

