Log4j: Making the Case for Structured Hunting

Even APTs are Lazy

  • CTI — e.g., prompted by information from an open or privileged source such as media coverage of an emerging threat or from government agencies.
  • TTPs — e.g., to provide coverage of a tactic or technique in the MITRE ATT&CK or other frameworks.
  • Risk assessment — e.g., to provide coverage of an identified ‘blind spot’ in the organization’s security controls.

--

--

--

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

THE REWARD OF GAMYFI

Why your data has most likely been stolen and what can you do about it

Purchasing Your Allocation Before the IDO Sale Start with Token Pre-Order Feature

Secure Access Service Edge (SASE)

The CD3D PinkSale IDO Event & Token Sales Development

{UPDATE} El penjat - Hangman game Hack Free Resources Generator

{UPDATE} Zombie Accident Hack Free Resources Generator

Is data the new oil? Why access to energy data matters for customers and businesses

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Cyborg Security

Cyborg Security

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

More from Medium

Incident Response Part 2.2 : Analysis

How To Use ATT&CK’s Application Datasource

Using Narrative Reports to Map Behaviors to ATT&CK

Network Analysis — Ransomware