Hunting

Tools for Cyber Threat Hunting: Enhancing Security Posture

In today’s rapidly evolving digital landscape, organizations face an increasing number of cyber threats. Proactive measures, such as cyber threat hunting, have become essential in identifying and mitigating risks before they escalate. Here are some key tools and techniques that can enhance your threat-hunting capabilities: 1. SIEM (Security Information and Event Management) Solutions SIEM platforms, […]

HUNTING FOR NETWORK SHARE RECON

This post was originally published here by Matthew Hosburgh. There’s a strong chance you know what your organization is trying to protect. In many cases, this is probably in the form of data. It could be customer data, trade secrets, and forms of classified information. This data can be stored in many places: databases, email, […]

HUNTING MISBEHAVING POWERSHELLS: EXAMINING NETWORK PATTERNS

This post was originally published here by  Matthew Hosburgh. Introduction By now the world has learned about the massive breach that Equifax reported in early September. The Cyber Kill Chain would classify the final stages of this attack as the actions on objective. Unfortunately, Equifax did not detect this activity in time to contain or prevent the data loss. […]

Share this page