Rapidly Search and Hunt through Windows Event Logs Illustration: Pexel, Skitterphoto Incident Response Lifecycle: In the event that one of your endpoint protection software identifies malicious software on a laptop, this blog will provide steps that can ensure the spread … Read More
threat hunting

MITRE Attack Design & Philosophy Essay
MITRE Attack Design & Philosophy Illustration: Pexel, Anete Lucina ATT&CK Framework Abstract: By reading the popular white paper called “MITRE Attack Design & Philosophy” one can be armed with the knowledge that this framework was created out of sheer necessity … Read More