Network Detection Response (NDR) - HTTP Analysis Part 1
HTTP is one of the most widely recognized protocols, essential for daily internet communication. Its ubiquity ensures it’s readily...
HTTP is one of the most widely recognized protocols, essential for daily internet communication. Its ubiquity ensures it’s readily...
If you have the same dashboard content you want to display across multiple similar but different items, it can be extremely cumbersome to...
The externaldata KQL operator enables you to download data from the Internet and temporarily store it as a KQL table for querying. It...
Many people take Internet connectivity for granted, but it’s made possible by network operators. These service providers interconnect...
Cyber Incident Response Communications Plan Purpose The purpose of this communications plan is to ensure secure, efficient, and...
Purpose The purpose of this policy is to establish a standardized process for the declaration of a cyber incident and the subsequent...
There are many nuances to running a SOC which include, responsibilities and authorities within the organization, interactions with other...
Users of Endpoint Detection Response (EDR) systems know they are powerful tools for detecting Threat Actors (TA)'s. But there is often...
In simple terms, Zeek sensors capture traffic, generate protocol-specific log files for the captured session traffic, and can export...
Automation Overview Identify and prioritize processes for automation: Begin with standard, repetitive tasks that can be easily automated,...
Cyberattacks persistently target both systems and individuals. Among these, compromising user credentials stands out as a prevalent...
One critical aspect of malware behavior lies in Data Obfuscation, where malware seeks to conceal its activities through various...
SOC assessments: Set a reference for SOC capabilities. Identify detection engineering data-source gaps Identify detection engineering use...
Authentication Logging for Operating Systems Overview One crucial aspect of cybersecurity involves monitoring logins associated with user...
Cyber Threat Intelligence (CTI) plays a vital role in enhancing detection capabilities and empowering organizations to make well-informed...
When collecting Zeek data, you have a rich source of information for analysis. However, when monitoring systems, it's crucial to...
Elastic - Overview When considering data storage in Elasticsearch, it's common to think of relational databases. However, Elasticsearch...
NIST 800-53 logging controls are primarily categorized within the AU (Audit and Accountability) control family. Within AU, there are...
In cybersecurity, various logging systems are employed, often known as 'Security Information & Event Management' (SIEM) systems when...
Ensuring the security of an organization's Domain Controller (DC) is paramount, recognizing it as a critical asset that must be protected...