5 KQL Queries for Malicious Network Traffic
Hunt for threats in Microsoft Sentinel with these 5 KQL Queries for Malicious Network Traffic.
1832 words
|
9 minutes
Cover Image of the Post
The Pyramid of Pain - A Guide to Cybersecurity Threat Detection
Learn how the Pyramid of Pain framework helps prioritize cybersecurity defenses by understanding which threat indicators cause attackers the most difficulty when detected and blocked.
1835 words
|
9 minutes
Cover Image of the Post
Getting Started with IP Recon
How to get started using the IP Recon Bulk Reputation Tool
358 words
|
2 minutes
Cover Image of the Post
AiTM Attacks Explained
A detailed guide explaining how Adversary-in-the-Middle (AiTM) attacks bypass MFA by hijacking session tokens, with detection techniques and threat hunting queries.
1702 words
|
9 minutes
Cover Image of the Post
What is IP Recon?
A comprehensive look into IP Recon bulk IP reputation tool.
847 words
|
4 minutes
Cover Image of the Post
Comprehensive Nmap Cheat Sheet
A detailed Nmap cheat sheet for mastering Nmap for security assessments and penetration testing.
554 words
|
3 minutes
Cover Image of the Post
1