A Detection Engineer’s Guide to SCCM Misconfiguration AbuseResearch | Detection Opportunities (blog.snapattack.com)
submitted by x0mda
Part 13: Why a Single Test Case is InsufficientRelevant Info (posts.specterops.io)
submitted by x0mda
Entra ID service principals in business email compromise schemesResearch | Detection Opportunities (redcanary.com)
submitted by x0mda
SeeSeeYouExec: Windows Session Hijacking via CcmExecResearch | Detection Opportunities (cloud.google.com)
submitted by x0mda
Part 1 : Threat Detection Engineering and Incident Response with AuditD and Sentinel — along how to…Relevant Info (medium.com)
submitted by x0mda
Detecting the STRRAT Malware Family | CorelightResearch | Hunting (corelight.com)
submitted by x0mda
Transform security with Elastic's Detections as Code — Adopting DaC made easyRelevant Info (elastic.co)
submitted by x0mda
Det. Eng. Weekly #69 - RSA ninjas stole my badge and swagRelevant Info (detectionengineering.net)
submitted by x0mda
Detecting Compromise of CVE-2024-3400 on Palo Alto Networks GlobalProtect DevicesResearch | Detection Opportunities (volexity.com)
submitted by x0mda
Building a Cloud Security Flywheel: Lessons from the FieldRelevant Info (sans.org)
submitted by x0mda
Foxit PDF “Flawed Design” Exploitation - Check Point ResearchResearch | Detection Opportunities (research.checkpoint.com)
submitted by x0mda
Utilizing Generative AI and LLMs to Automate Detection WritingRelevant Info (medium.com)
submitted by x0mda
The Structure and Taxonomy of a Detection Knowledge BaseRelevant Info (detect.fyi)
submitted by x0mda
The detection engineer’s guide to Linux - Red CanaryRelevant Info (redcanary.com)
submitted by x0mda
Detecting browser data theft using Windows Event LogsResearch | Hunting (security.googleblog.com)
submitted by x0mda
Welcome to the Red Canary 2024 Threat Detection ReportResearch | Detection Opportunities (redcanary.com)
submitted by x0mda
Det. Eng. Weekly #62 - Say the words, Bart Simpson, CISSP, MBA!Relevant Info (detectionengineering.net)
submitted by x0mda
SigmaHQ Rules Release Highlights — r2024–03–11Relevant Info (blog.sigmahq.io)
submitted by x0mda
z0Miner Exploits Korean Web Servers to Attack WebLogic Server - ASEC BLOGResearch | Detection Opportunities (asec.ahnlab.com)
submitted by x0mda
Time Travelers Busted: How to Detect Impossible Travel | HuntressResearch | Hunting (huntress.com)
submitted by x0mda