Threat hunting January 18, 2021 Dan Virgillito Linux security and APTs: Identifying threats and reducing risk Think your Linux system is immune to malware? Well, think again. Advanced attack groups have sophisticated PHP rootkits, web shells, exploit code and backdoors...
Threat hunting January 14, 2021 Beth Osborne FBI releases Rana Intelligence Computing indicators of compromise (IOCs) The FBI’s Cyber Division recently disclosed that Iran’s intelligence agency is employing nation-state actors and a front company, Rana Intelligence Computing,...
Threat hunting August 13, 2019 Lester Obbayi Threat hunting with Kolide and osquery In this article, we’ll discuss how we can use Kolide Fleet for threat-hunting purposes. This article is not intended to be an introductory piece, but rather...
Threat hunting July 31, 2019 Lester Obbayi Threat hunting with osquery In this article, we take a look at osquery and how it can be used to query the security, reliability and compliance information of systems within your network...
Threat hunting June 6, 2019 Lester Obbayi Threat hunting with Cymon API In this article, we’ll discuss mock intrusion attempts on our systems and show you how to make use of Cymon API to query important information that you can...
Threat hunting May 29, 2019 Lester Obbayi Threat hunting with SaltOpen The SaltStack platform is an open-source and Python-based configuration management software. Using Salt, developers and system administrators can better manage...
Threat hunting May 9, 2019 Lester Obbayi Threat hunting with Graylog Graylog is a leading centralized log management solution which allows security teams to log, store and analyze huge amounts of data. One area where Graylog...
Threat hunting May 8, 2019 Howard Poston Threat Hunting: Remediation The majority of a threat hunter’s role is looking for the “needle in the haystack” by using a variety of different tools and techniques to look for threats...
Threat hunting May 7, 2019 Howard Poston Threat-hunting techniques: Conducting the hunt Many organizations only perform reactive threat-hunting, searching for threats once it’s obvious that their environment has been compromised. A mature threat-hunting...
Threat hunting April 11, 2019 Ravi Das (writer/revisions editor) Top 31 threat-hunting interview questions and answers for 2019 In this article, we will examine the top thirty-one interview questions that could be asked of you as an applicant for the position of threat hunter. The purpose...