InOSINT TeambyVikas ChauhanDetect APT Group with Wazuh Part Two | APT UNC4841Global Exploitation of Barracuda ESG and the Lessons in Cybersecurity Resilience4d ago
GunthertriggerThe Art of Attribution : Case of a Chinese Threat Actor which was wrongly attributed.3d ago
Roozbeh NorooziHunting APT with Syscall monitoring: Real ScenarioA syscall (short for system call) is a mechanism used by applications to request services from the operating system’s kernel. Since…5d ago5d ago
Scott Bolen | RONIN OWL CTIBuilding Your Threat Intelligence Home Lab: A Practical GuideSetting up a home lab is like having your own cybersecurity playground — a place to explore, learn, and sharpen your threat intelligence…Aug 131Aug 131
TahirCybersecurity Threat Hunting ExplainedThreat hunting is proactive. It’s not about responding to alarms but digging into data to spot subtle signs of danger. Think of it as…Dec 5Dec 5
InOSINT TeambyVikas ChauhanDetect APT Group with Wazuh Part Two | APT UNC4841Global Exploitation of Barracuda ESG and the Lessons in Cybersecurity Resilience4d ago
GunthertriggerThe Art of Attribution : Case of a Chinese Threat Actor which was wrongly attributed.3d ago
Roozbeh NorooziHunting APT with Syscall monitoring: Real ScenarioA syscall (short for system call) is a mechanism used by applications to request services from the operating system’s kernel. Since…5d ago
Scott Bolen | RONIN OWL CTIBuilding Your Threat Intelligence Home Lab: A Practical GuideSetting up a home lab is like having your own cybersecurity playground — a place to explore, learn, and sharpen your threat intelligence…Aug 131
TahirCybersecurity Threat Hunting ExplainedThreat hunting is proactive. It’s not about responding to alarms but digging into data to spot subtle signs of danger. Think of it as…Dec 5
InDetect FYIbymthchtThreat Hunting - Suspicious User AgentsHunting for Suspicious User Agents with SplunkJan 12
TahirWhat is a SOAR (Security, Orchestration, Automation & Response)SOAR stands for Security Orchestration, Automation, and Response. Think of it as incident response on steroids. It combines tools…Dec 5
InDetect FYIbySIMKRAThreat-Informed Defense human-driven — real-world behavior Threat HuntingPreventing Ransomware with proactive threat huntingNov 81