Log4j: Making the Case for Structured Hunting

Even APTs are Lazy

  • CTI — e.g., prompted by information from an open or privileged source such as media coverage of an emerging threat or from government agencies.
  • TTPs — e.g., to provide coverage of a tactic or technique in the MITRE ATT&CK or other frameworks.
  • Risk assessment — e.g., to provide coverage of an identified ‘blind spot’ in the organization’s security controls.

--

--

--

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

BTC6X AN EXCHANGE FOR ALL.

Seven Website Vulnerability Scanner Tips

Same Origin Policy & CORS— From the beginning

{UPDATE} Zombie Raiders Survival Hack Free Resources Generator

Are trackers the new backbone of the Web?

Sonic Drive-in Hack: a study of credit card theft

How to conduct online video meetings securely?

Detecting Lateral Movement Data Analysis

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Cyborg Security

Cyborg Security

Cyborg Security is a pioneer in cybernetic threat hunting, delivering an advanced, actionable threat hunting platform.

More from Medium

Advanced Purple Teaming

BTLO: Log Analysis — Privilege Escalation

Critical CVEs: Why Chasing Squirrels is Driving the Whole Industry Nuts

STIX & TAXII in Cyber Threat Intelligence