Skip to content
Home
About Us
Authors
Contact Us
Submit News
Register
Sitemap
Twitter
Linkedin-in
Youtube
Rss
CISO Notepad Series
Cybersecurity Latest Stories & News
Cyber Security Attacks & Incidents
Vulnerabilities & Zero Days
Account Login
Home
0 – CT – SOC – CSIRT Operations – Threat Hunting
0 – CT – SOC – CSIRT Operations – Threat Hunting
Joas Antonio
Ransomware Investigation osint and hunting Overview PT1
Cyborg Security
Threat Hunting Framework by Cyborg Security
Ekran
CISOs-Practical Guide and Set of Worksheets for Building Insider Threat Program
Microsoft Security
THREAT HUNTING SURVIVAL GUIDE
LOG RHYTHM
Threat Hunting 101
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
Dror Amrami
TESLA Cars Cyber Security – Threats Vulnerabilities Hacking Protection by Dror Amrami
Bridewell
THREAT INTELLIGENCE REPORT – Shadow Syndicate: A Global Ransomware-as-a-Service Player?
Threat Intel Roundup: DeadGlypH, T-Mobile, Juniper SRX, JetBrains TeamCity
The ultimate Guide to Threat Profiling
RANK
Threat Hunting Playbook
Security Boulevard
ReversingLabs A1000 Threat Analysis and Hunting Solution Update Drives SecOps Forward – Source: securityboulevard.com
HHS
The evolution of Cyber Hunt Processes from IOCs to TTPs by HHS
PRASANNAKUMAR MUNDAS
Threat Hunting Playbooks for MITRE Tactics – Starting your first threat hunting today by PRASANNAKUMAR...
ENDGAME
The Endgame Guide to Threat Hunting by Paul Ewing & Devon Kerr
CISO2CISO Notepad Series
GIR – The Guide to Cyber Investigations.
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
CSA Singapure
Guide to Cyber Threat Modelling by CSA Singapure
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
LOG RHYTHM
Using MITRE ATT&CK IN THREAT HUNTING AND DETECTION BY LogRhythm
CISO2CISO Notepad Series
The Red Team Guide by Peerlyst – A practical guide for Red Teams and Offensive...
RELIAQUEST
Threat Hunting 101 – A Framework for Building and Maturing a Proactive Threat Hunting Program...
SANS
SANS Offensive Operations – ChatGPT for Offensive Security – What is ChatGPT and how can...
CROWDSTRIKE
2022 Falcon OverWatch Threat Hunting Report – NOWHERE TO HIDE by CROWDSTRIKE
OFFENSIVE SECURITY
Offensive Security OSCP Exam with AD Preparation by Michael Mancao
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
SecurityHQ
A Checklist for Effective Threat Hunting by SecurityHQ
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
WILEY
Threat Hunting for Dummies
HADESS
GITHUB IN THE WILD – Some examples of offensive security used github by HADESS
Posts navigation
1
2
…
5
Latest Cyber News
securityweek.com
New ‘Turtle’ macOS Ransomware Analyzed – Source: www.securityweek.com
01/12/2023
securityweek.com
US Sanctions North Korean Cyberespionage Group Kimsuky – Source: www.securityweek.com
01/12/2023
securityweek.com
Simple Attack Allowed Extraction of ChatGPT Training Data – Source: www.securityweek.com
01/12/2023
The Hacker News
New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia – Source:thehackernews.com
01/12/2023
securelist.com
IT threat evolution in Q3 2023. Mobile statistics – Source: securelist.com
01/12/2023
securelist.com
IT threat evolution Q3 2023 – Source: securelist.com
01/12/2023
securelist.com
IT threat evolution in Q3 2023. Non-mobile statistics – Source: securelist.com
01/12/2023
The Register Security
Regulator says stranger entered hospital, treated a patient, took a document … then vanished – Source: go.theregister.com
01/12/2023
The Register Security
Interpol makes first border arrest using Biometric Hub to ID suspect – Source: go.theregister.com
01/12/2023