SECLEN

SECLEN

threat hunting

40 stories

SECLEN

SECLEN

sentinel

12 stories

SECLEN

SECLEN

CTI TI

3 stories

SECLEN

SECLEN

KQL

9 stories

SECLEN

SECLEN

threat hunting hypothesis

6 stories

Threat Profiling: How to Understand Hackers and Their TTPs
SECLEN

SECLEN

osint

10 stories

Black and white pencil sketch of an investigator analyzing phishing attacks, surrounded by digital screens, a magnifying glass, and interconnected phishing URLs.
SECLEN

SECLEN

open source tools soc

4 stories

Black and white pencil sketch of an investigator analyzing phishing attacks, surrounded by digital screens, a magnifying glass, and interconnected phishing URLs.
SECLEN

SECLEN

analysis email malware etc

1 story

Black and white pencil sketch of an investigator analyzing phishing attacks, surrounded by digital screens, a magnifying glass, and interconnected phishing URLs.
SECLEN

SECLEN

ADAPT

1 story

SECLEN

SECLEN

be anonymous

2 stories

SECLEN

SECLEN

phishing tools

2 stories

SECLEN

SECLEN

ATT&CK

9 stories

SECLEN

SECLEN

threat hunting frameworks

2 stories

SECLEN

SECLEN

canary tokens tips an tricks

1 story

SECLEN

SECLEN

pyramid of pain

1 story

SECLEN

SECLEN

sigma and yara

2 stories

SECLEN

SECLEN

phish techniques

7 stories

SECLEN

SECLEN

lnk files payload decode

2 stories

SECLEN

SECLEN

dorking

7 stories

SECLEN

SECLEN

darkweb how to

1 story

SECLEN

SECLEN

I am a Microsoft soc tier 2 analyst exploring new ways to enrich my investigations!