Aardvark InfinityinAardvark Infinity30 Indicators of Compromise (IOCs) Tied to Government of Canada (2010–2024)## Introduction From 2010 to 2024, the Government of Canada has faced numerous cyber threats, with various Indicators of Compromise (IOCs)…Jul 26
Chris Martin (@thatsiemguy)IOC matching in Chronicle SIEMAn adventure and journey in differnt ways you can perform IOC matching in Chronicle SIEM.Mar 15, 20232
TvinaykashyapMISP — Threat Intel Platform in DetailMISP which is Malware Information Sharing Platform, used as a medium for sharing Threat Intelligence. We integrate threat intel feeds from…Jun 5Jun 5
Efstratios LontzetidisCyber Threat Intelligence Pivoting: From a single alert to multiple IoCsSecurity Operation Centers (SOCs) mainly deal with handling alerts from various security tools like Proxies, Antivirus software, Intrusion…Nov 9, 2023Nov 9, 2023
Shreelu Santosh (Lun4rC1ph3r)Introduction to Threat HuntingMy notes from Security Blue Team’s Introduction to Threat Hunting free course.Apr 21Apr 21
Aardvark InfinityinAardvark Infinity30 Indicators of Compromise (IOCs) Tied to Government of Canada (2010–2024)## Introduction From 2010 to 2024, the Government of Canada has faced numerous cyber threats, with various Indicators of Compromise (IOCs)…Jul 26
Chris Martin (@thatsiemguy)IOC matching in Chronicle SIEMAn adventure and journey in differnt ways you can perform IOC matching in Chronicle SIEM.Mar 15, 20232
TvinaykashyapMISP — Threat Intel Platform in DetailMISP which is Malware Information Sharing Platform, used as a medium for sharing Threat Intelligence. We integrate threat intel feeds from…Jun 5
Efstratios LontzetidisCyber Threat Intelligence Pivoting: From a single alert to multiple IoCsSecurity Operation Centers (SOCs) mainly deal with handling alerts from various security tools like Proxies, Antivirus software, Intrusion…Nov 9, 2023
Shreelu Santosh (Lun4rC1ph3r)Introduction to Threat HuntingMy notes from Security Blue Team’s Introduction to Threat Hunting free course.Apr 21
Florian RothCapturing Detection Ideas to Improve Their ImpactThreat researchers, malware analysts, and digital forensic specialists often share advice, hints, and ideas with the community through…Oct 8, 2022
ZrhmzFinding Malware with SysinternalsJoin us as we navigate the landscape of system administration with Sysinternals as our guiding star .Apr 20
Efstratios LontzetidisCyber Threat Intelligence Sharing: making the investigation outcomes actionableIn continuation of the article: Cyber Threat Intelligence Pivoting: From a single alert to multiple IoCs, after an investigation has been…Nov 27, 20231