Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
Home
0 – CT – SOC – CSIRT Operations – Threat Hunting
Page 2
0 – CT – SOC – CSIRT Operations – Threat Hunting
TACTICX
Offensive Microsoft Active Directory 101 – Security Holes Everywere by TACTICX – Active Directory Attack.
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect, deter, and...
PRASANNAKUMAR MUNDAS
Threat Hunting Playbooks for MITRE Tactics – Starting your first threat hunting today by PRASANNAKUMAR...
CISO2CISO Notepad Series
The Red Team Guide by Peerlyst – A practical guide for Red Teams and Offensive...
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
SecurityHQ
A Checklist for Effective Threat Hunting by SecurityHQ
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
HHS
The evolution of Cyber Hunt Processes from IOCs to TTPs by HHS
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
WILEY
Threat Hunting for Dummies
Joas Antonio
Ransomware Investigation (OSINT & HUNTING) Overview PT1 by Joas Antonio
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
CHAOS SEARCH
The Threat Hunter´s Handbook
HADESS
GITHUB IN THE WILD – Some examples of offensive security used github by HADESS
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
SANS
SANS Offensive Operations – ChatGPT for Offensive Security – What is ChatGPT and how can...
OFFENSIVE SECURITY
Offensive Security OSCP Exam with AD Preparation by Michael Mancao
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
UnifiedKillChain.com
The Unified Kill Chain by Paul Pols
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
RANK
Threat Hunting Playbook – Learn how to embrace a proactive security posture by Rank.
SecurityHQ
A checklist for efective Threath Hunting by SecurityHQ
The Register Security
Ukraine accuses Russian spies of hunting for war-crime info on its servers – Source: go.theregister.com
securityweek.com
China’s Offensive Cyber Operations in Africa Support Soft Power Efforts – Source: www.securityweek.com
The Register Security
Microsoft, recently busted by Beijing, thinks it’s across China’s ever-changing cyber-offensive – Source: go.theregister.com
Security Boulevard
BSides Buffalo 2023 – Kelsey Seymour – Dispelling The Myth Of “Maturity” In Threat Hunting...
Infosecurity Magazine
Russian APT Intensifies Cyber Espionage Activities Amid Ukrainian Counter-Offensive – Source: www.infosecurity-magazine.com
Welivesecurity.com
Telekopye: Hunting Mammoths using Telegram bot – Source:
Cyber Talk
How AI turbocharges your threat hunting game – Source: www.cybertalk.org
Posts navigation
1
2
3
4
Latest Cyber News
Data Breach Today
The Cost of Underpreparedness to Your Business – Source: www.databreachtoday.com
04/07/2024
Data Breach Today
Why Zero Trust Is Critical in Health and Government Sectors – Source: www.databreachtoday.com
04/07/2024
Data Breach Today
Embracing Resilience, Grit and Adaptability in the Workplace – Source: www.databreachtoday.com
04/07/2024
Data Breach Today
Cisco Patches an Exploited Zero-Day Vulnerability – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Meta and YouTube Update Their AI Content Policies – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Evolve Ransomware Hack Affects Affirm and Fintech Companies – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Rapid7 Purchases Noetic for Better Attack Surface Management – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
03/07/2024