Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
0 – CT – SOC – CSIRT Operations – Threat Hunting
Page 2
0 – CT – SOC – CSIRT Operations – Threat Hunting
OFFENSIVE SECURITY
Offensive Security OSCP Exam with AD Preparation by Michael Mancao
RANK
Threat Hunting Playbook – Learn how to embrace a proactive security posture by Rank.
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
SecurityHQ
A checklist for efective Threath Hunting by SecurityHQ
HADESS
GITHUB IN THE WILD – Some examples of offensive security used github by HADESS
Joas Antonio
Threat Hunting Introduction by Joas Antonio
HHS
The Evolution of Cyber Hunt Processes From IOCs to TTPs by HHS OIS Organization
HHS
The evolution of Cyber Hunt Processes from IOCs to TTPs by HHS
LOG RHYTHM
Using MITRE ATT&CK IN THREAT HUNTING AND DETECTION BY LogRhythm
TACTICX
Offensive Microsoft Active Directory 101 – Security Holes Everywere by TACTICX – Active Directory Attack.
ENDGAME
The Endgame Guide to Threat Hunting by Paul Ewing & Devon Kerr
CISO2CISO Notepad Series
GIR – The Guide to Cyber Investigations.
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
CSA Singapure
Guide to Cyber Threat Modelling by CSA Singapure
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
Joas Antonio
Ransomware Investigation (OSINT & HUNTING) Overview PT1 by Joas Antonio
RELIAQUEST
Threat Hunting 101 – A Framework for Building and Maturing a Proactive Threat Hunting Program...
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by Dmitry Janushkevich...
CROWDSTRIKE
2022 Falcon OverWatch Threat Hunting Report – NOWHERE TO HIDE by CROWDSTRIKE
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
The Register Security
Ukraine accuses Russian spies of hunting for war-crime info on its servers – Source: go.theregister.com
securityweek.com
China’s Offensive Cyber Operations in Africa Support Soft Power Efforts – Source: www.securityweek.com
The Register Security
Microsoft, recently busted by Beijing, thinks it’s across China’s ever-changing cyber-offensive – Source: go.theregister.com
Security Boulevard
BSides Buffalo 2023 – Kelsey Seymour – Dispelling The Myth Of “Maturity” In Threat Hunting...
Infosecurity Magazine
Russian APT Intensifies Cyber Espionage Activities Amid Ukrainian Counter-Offensive – Source: www.infosecurity-magazine.com
Welivesecurity.com
Telekopye: Hunting Mammoths using Telegram bot – Source:
Cyber Talk
How AI turbocharges your threat hunting game – Source: www.cybertalk.org
Security Boulevard
Fortra Introduces New Integrations for Offensive Security – Source: securityboulevard.com
Posts navigation
1
2
3
4
Latest Cyber News
Data Breach Today
ISMG Editors: RSA Conference 2024 Wrap-Up – Source: www.databreachtoday.com
11/05/2024
Data Breach Today
Hackers Steal Credit Card Data of Deal-Seeking Shoppers – Source: www.databreachtoday.com
11/05/2024
Data Breach Today
Live Webinar | Correcting your Cyber Security Posture with the Board: Data, Metrics and Lessons...
11/05/2024
Data Breach Today
Solving the Fractured Data Problem in Exposure Management – Source: www.databreachtoday.com
11/05/2024
Data Breach Today
Ascension Diverts Emergency Patients, Postpones Care – Source: www.databreachtoday.com
11/05/2024
The Guardian UK
MoD contractor hacked by China failed to report breach for months – Source: www.theguardian.com
11/05/2024
The Register Security
Iran most likely to launch destructive cyber-attack against US – ex-Air Force intel analyst – Source: go.theregister.com
11/05/2024
The Register Security
Cybercriminals hit jackpot as 500k+ Ohio Lottery lovers lose out on their personal data – Source: go.theregister.com
11/05/2024
The Register Security
Microsoft’s Brad Smith summoned by Homeland Security committee over ‘cascade’ of infosec failures – Source: go.theregister.com
11/05/2024