PinnedPublished inDetect FYIThreat Hunting via Autonomous System Numbers (ASN)Nowadays, blocking specific IPs or domains after they start malicious activities, is becoming less effective due the ease of accessing…Feb 23A response icon1Feb 23A response icon1
Published inDetect FYIThreat Hunting over internal Devices via KQL QueriesThis time, I want to dive into one of the phases of an intrusion: when attackers quietly pivot across internal systems that many still…Oct 30A response icon1Oct 30A response icon1
Published inDetect FYIDetecting Tampering of Windows Security Audit PolicyRecently, I finished reading a book I strongly recommend to anyone working in Threat Hunting, BTFM (Blue Team Field Manual).Oct 24Oct 24
Published inDetect FYIIdentifying File Exfiltration via RDP Sessions with KQL Queries (Dia de los Muertos Special)By a twist of fate, about 10 years ago, Mexico became a very big part of my life — and I could even say, my second family (or perhaps my…Oct 14Oct 14
Published inDetect FYIUse KQL to Surface Non-Recommended TLS Parameters (IANA-based)Time ago, I developed a group of KQL queries to flag network negotiations tagged as non-recommended TLS curves and cipher suites based on…Sep 22Sep 22
Published inDetect FYIThreat Hunting sessions via AuthenticationProcessingDetails on AADSignInEventsBetaWhen digging into sign-in activity in Microsoft Entra ID, one of the available table is AADSignInEventsBeta. Buried inside it, the field…Sep 16A response icon3Sep 16A response icon3
Published inDetect FYIThe importance of match ratio using Threat Inteligence Feeds (combined with KQL Collectors)Nowadays, we can find hundreds of Threat Intelligence feeds available across the internet. Most of them focus on the typical indicators…Sep 8Sep 8
Published inDetect FYIMonitor Event Logs & Trigger DefenderXDR Alerts Without Ingesting DataOne of the biggest challenges when working with solutions like Microsoft Sentinel/DefenderXDR is deciding which data is worth collecting —…Aug 26A response icon1Aug 26A response icon1
Published inDetect FYIProtecting the Evidence in Real-Time with KQL QueriesA few weeks ago, I published a post titled Detecting Ransomware Final Stage Activities with KQL Queries where I shared different phases and…Jul 24Jul 24
Published inDetect FYIIdentifying Ransomware Final Stage activities with KQL QueriesWhen ransomware strikes, it doesn’t just encrypt files — it often wraps up with a series of stealthy moves meant to lock you out, cover…Jul 2Jul 2