Shuvro HawkUnderstanding the Cyber Criminal Elite: Insights from OffSec TH-200 Course module 2 section 3In the world of cybersecurity, Advanced Persistent Threats (APTs) stand as some of the most sophisticated and dangerous adversaries. Often…Sep 22
Anton ChuvakininAnton on SecurityReading the Mandiant M-Trends 2024This is my informal, unofficial, unapproved etc blog based on my reading of the just-released Mandiant M-Trends 2024 report (Happy 15th…May 11
PamC/FLYINGMUMGoogle Cloud Security Summit unveils new convergence-focused security features — SiliconANGLEGoogle LLC today announced several new security features and capabilities at its annual Google Cloud Security Summit that are aimed at…Aug 20Aug 20
Chris Martin (@thatsiemguy)Mandiant Fusion available in Google SecOps E+Example of using Mandiant Fusion IOC data with Google SecOps YARA-L rules in Detection Engine.May 14May 14
SOCFortressExecutable files analysis and capabilities detection using capa (Mandiant)IntroSep 26, 2023Sep 26, 2023
Shuvro HawkUnderstanding the Cyber Criminal Elite: Insights from OffSec TH-200 Course module 2 section 3In the world of cybersecurity, Advanced Persistent Threats (APTs) stand as some of the most sophisticated and dangerous adversaries. Often…Sep 22
Anton ChuvakininAnton on SecurityReading the Mandiant M-Trends 2024This is my informal, unofficial, unapproved etc blog based on my reading of the just-released Mandiant M-Trends 2024 report (Happy 15th…May 11
PamC/FLYINGMUMGoogle Cloud Security Summit unveils new convergence-focused security features — SiliconANGLEGoogle LLC today announced several new security features and capabilities at its annual Google Cloud Security Summit that are aimed at…Aug 20
Chris Martin (@thatsiemguy)Mandiant Fusion available in Google SecOps E+Example of using Mandiant Fusion IOC data with Google SecOps YARA-L rules in Detection Engine.May 14
SOCFortressExecutable files analysis and capabilities detection using capa (Mandiant)IntroSep 26, 2023
Safiullah KhanAPT1 China’s Cyber Espionage Group Attack Life Cycle with Reference to Mandiant Attack Cycle.In this Article we have been passing through the detailed Attack Life Cycle of APT1 Cyber Espionage and highlighted the main techniques and…Aug 7
ArunklinTheSecMasterWhat is There in The Mandiant’s Defender’s Advantage Cyber Snapshot Report- Issue 3Mandiant recently published the latest edition of The Defender’s Advantage Cyber Snapshot report. This recurring report aims to arm…Sep 14, 2023
MichaelLearns_Threat Hunting with Security Blue TeamI had a little break for my penetration testing certification prep this month and decided to spend a bit of time learning more about Threat…Dec 30, 2023