Readers! As mentioned on my recent LinkedIn update, this is the first blog article in this series about what our adversaries do and from their
Category: Threat Hunting
Readers! Last year one of the member on SANS DFIR posted a question with regards to identifying whether there was any data leakage occurred in
The buzz word first came in 2014 and individuals who were actually performing activities such as hunting for adversaries within network interested in Threat Hunting
Been security analyst in SOC for more than 3 years. Besides waiting for the alerts triggering from the device such as IPS or end point protection,