Mastering Threat Hunting Operations: A Deep Dive into Recon InfoSec’s Approach
In today’s rapidly evolving cyber threat landscape, proactive defense is no longer optional—it’s...
In today’s rapidly evolving cyber threat landscape, proactive defense is no longer optional—it’s...
In July, Eric & Whitney gave a talk titled "Breaches Be Crazy" at the SANS DFIR Summit outlining...
Whether your cybersecurity detection and response capabilities are in-house or managed through a...
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
If you are here hoping to learn more about using Graylog for the purpose of monitoring the security...
Much has already been said about the recently reported SolarWinds compromise. In this post, we are...
Our team are huge fans of Velociraptor. It's an incredibly powerful tool, for both DFIR and...
TL;DR - we needed to ingest multiple sources of Cylance logs into Graylog, and this is how we did...
I tweeted this the other day, and had a lot of folks reach out asking for more details/a diagram of...