Hunting
HUNTING FOR NETWORK SHARE RECON
This post was originally published here by Matthew Hosburgh. There’s a strong chance you know what your organization is trying to protect. In many cases, this is probably in the form of data. It could be customer data, trade secrets, and forms of classified information. This data can be stored in many places: databases, email, […]
HUNTING MISBEHAVING POWERSHELLS: EXAMINING NETWORK PATTERNS
This post was originally published here by Matthew Hosburgh. Introduction By now the world has learned about the massive breach that Equifax reported in early September. The Cyber Kill Chain would classify the final stages of this attack as the actions on objective. Unfortunately, Equifax did not detect this activity in time to contain or prevent the data loss. […]