Hunting

Tactics to take up implied cyber threat hunting- proactive strategies to smartly thrwat hidden cyber risks

In the ever-evolving landscape of cybersecurity, detecting and responding to threats has become more complex. One of the more advanced techniques gaining traction is implied cyber threat hunting. Unlike traditional threat hunting, which often involves reacting to known threats and signature-based detection, implied threat hunting focuses on uncovering hidden or yet-to-be-identified threats based on contextual […]

HUNTING FOR NETWORK SHARE RECON

This post was originally published here by Matthew Hosburgh. There’s a strong chance you know what your organization is trying to protect. In many cases, this is probably in the form of data. It could be customer data, trade secrets, and forms of classified information. This data can be stored in many places: databases, email, […]

HUNTING MISBEHAVING POWERSHELLS: EXAMINING NETWORK PATTERNS

This post was originally published here by  Matthew Hosburgh. Introduction By now the world has learned about the massive breach that Equifax reported in early September. The Cyber Kill Chain would classify the final stages of this attack as the actions on objective. Unfortunately, Equifax did not detect this activity in time to contain or prevent the data loss. […]

Share this page