Join us for our next 6-hour free hands-on threat hunting training course. Live and virtual and interactive. Tuesday, June 25th. Those who join live will receive a Level-1 Threat Hunting Certificate. Details: https://lnkd.in/e6t3tENM
Active Countermeasures’ Post
More Relevant Posts
-
I am thrilled to share that I have successfully completed the Threat Hunting: Foothold room. Throughout this experience, I delved into the intricacies of hunting malicious activity that indicates a potential initial compromise of a workstation or a machine. Additionally, I acquired valuable insights into the following topics: - Understanding the attacker's mindset in achieving initial access, Execution, Defence Evasion, Persistence, Command and Control. - Correlating succeeding actions executed by an attacker after obtaining a foothold. - Differentiating suspicious host and network events from benign ones. - Getting acquainted with the MITRE Tactics involved once an attacker gets inside the target organization. I utilized various resources to enhance my understanding, including the following search results: - Threat Hunting Week: Foothold: How to hunt suspicious activities | TryHackMe - Ye Lin Aung (Chris) on LinkedIn: TryHackMe | Threat Hunting: Foothold - Aamir Ehsan on LinkedIn: Threat Hunting: Foothold - TryHackMe WalkThrough - Threat Hunting: Foothold TryHackMe - YouTube - Persistent Footholds & Threat Hunting - KW Corporation #ThreatHunting #Cybersecurity #InfoSec #MITRE #SecurityOperations
TryHackMe | Threat Hunting: Foothold
tryhackme.com
To view or add a comment, sign in
-
Yes! My buddy Jeremy Weidner helped build out this ebook. The industry gets stuck on 'threat hunting' as a term which is most cases is only analysis work. Signatures alerting can only get you so far and having a human in your environment proactively looking for that IT admin doing legit but rogue activities is just one example of what could be discovered. If you get a moment, check out my buddies ebook, a great read!
Interested in understanding the difference between “real” Threat Hunting versus “make believe” threat hunting? Must read “Threat Hunting Done Right” ebook authored by Jeremy W. Of CyberMaxx #cybersecurity #mdr https://lnkd.in/eJuJZJ92
Threat Hunting eBook | CyberMaxx
https://www.cybermaxx.com
To view or add a comment, sign in
-
Completed Threat Hunting & Hunting With Elastic module! ✅Insights into the process of threat hunting, and comprehending its relationship with risk assessment and incident handling. ✅Skills to accurately interpret a threat intelligence report. ✅Practical experience in performing threat hunting using the Elastic stack leveraging a multitude of log sources. *********** One of my favorite modules so far on the SOC path emphasizing the practical and giving you freedom to find the flags needed 5⭐.
Completed Introduction to Threat Hunting & Hunting With Elastic
academy.hackthebox.com
To view or add a comment, sign in
-
Financial Crime Fighter experienced in Threat Intelligence, Anti-Fraud, DFIR - VP Global Sales @ Group-IB
Are you a threat hunter? Have you seen our latest research blog about the APT activity of DarkPink? Here is a very practical and real example of how to perform threat hunting activity to detect DLL side loading techniques that DarkPink has been seen using in their campaigns. Bravo to Roman Rezvukhin on this very practical, free post. https://lnkd.in/etD3jJ5G
Hunting Rituals #1: Threat hunting for DLL side-loading
group-ib.com
To view or add a comment, sign in
-
What makes an effective Threat Hunting strategy? Check our guide on #ThreatHunting Maturity Model to evaluate your current hunting process and define what can be improved.
Threat Hunting Maturity Model Explained With Examples - SOC Prime
https://socprime.com
To view or add a comment, sign in
-
Buena guía para principiantes, paso a paso, sobre Threat Hunting: Threat Hunting for Beginners: Hunting Standard Dll-Injected C2 Implants https://lnkd.in/en_vNJqP
Threat Hunting for Beginners: Hunting Standard Dll-Injected C2 Implants (Practical Course)
faanross.com
To view or add a comment, sign in
-
Linux | Cyber Security | Python | SQL | Ethical Hacking | Bug Bounty | API | Freelancer | Translator | Korean to English Translator | Subtitler
Day 39 of #100dayschallengeCompleted another milestone on TryHackMe. A great room to learn about Threat hunting and enter into the realm of the threats hunting and detection. The techniques and Procedures for threat hunting. Overall a great room for starters. #100dayschallenge #tryhackme #threats #threathunting #cybersecurity #learning #100dayscyberchallenge #tryhackmerooms https://lnkd.in/g8s_mAP9
Threat Hunting: Introduction
tryhackme.com
To view or add a comment, sign in
-
Sharing this Threat Hunting Framework created by the Cyborg Security(acquired by Intel 471) #threathunting team⚡ It covers the key elements of implementing an effective threat hunting program such as: ✅ pre-requisites 👥 team maturity ♻ the threat hunting cycle 🎯 hunting in action 💡 the long-term benefits of hunting I've shared this before, but we've got some new faces around here - Happy Hunting! #threathunting #threatdetection #threatintelligence #cybersecurity
To view or add a comment, sign in
-
Threat Hunting Done Right There's a common misconception among security vendors about the true nature of threat hunting, often mislabeling various activities under this term. To clarify and offer a precise definition of threat hunting, distinguishing it from what it's not, CyberMaxx released a comprehensive guide. Access your copy here https://gag.gl/qz1bqO
Threat Hunting eBook | CyberMaxx
https://www.cybermaxx.com
To view or add a comment, sign in
-
What makes an effective Threat Hunting strategy? Check our guide on the #ThreatHunting Maturity Model to evaluate your current hunting process and define what can be improved.
Threat Hunting Maturity Model Explained With Examples - SOC Prime
https://socprime.com
To view or add a comment, sign in
CISO in Data Analytics Company - Securing Smart Cities - CCSP, TOGAF, CCNA Cyberops, CEH, IA 27001, CSFPC, ITIL
1moRobert Barefield