We want to start by thanking everyone who supported us as early adopters.
We want to start by thanking everyone who supported us as early adopters.
Designed to save time during investigations and everyday DFIR tasks
Thomas has built an excellent malware triage skill, and I’ve added a couple of timeline analysis skills to help you get started.
Designed to save time during investigations and everyday DFIR tasks
Thomas has built an excellent malware triage skill, and I’ve added a couple of timeline analysis skills to help you get started.
C-Prot is currently #1 in the Linux EDR table, with exceptional depth and quality of raw telemetry. What really stands out is the level of transparency: we got direct access to a production...
C-Prot is currently #1 in the Linux EDR table, with exceptional depth and quality of raw telemetry. What really stands out is the level of transparency: we got direct access to a production...
I’ve built DFIR and quick triage workflows that save me hours every time! The time savings really add up, and it’s completely changed how I work.
I’ve built DFIR and quick triage workflows that save me hours every time! The time savings really add up, and it’s completely changed how I work.
If you’re looking for a good read, I’d recommend my Cobalt Strike write-ups (Part 1 & Part 2) from 2021–2022.
kostas.page/blog/cobalt-...
If you’re looking for a good read, I’d recommend my Cobalt Strike write-ups (Part 1 & Part 2) from 2021–2022.
kostas.page/blog/cobalt-...
If you are a security analyst in one of these big organizations, you need to have plan B….
If you are a security analyst in one of these big organizations, you need to have plan B….
After building threat hunting teams for large MSSPs, creating DFIR Labs for TheDFIRReport, and sharing years of free threat hunting material, I want to bring everything together into one platform. Something closer to how investigations...
After building threat hunting teams for large MSSPs, creating DFIR Labs for TheDFIRReport, and sharing years of free threat hunting material, I want to bring everything together into one platform. Something closer to how investigations...
Transparency has always been central to the EDR Telemetry Project. Evaluations may involve different levels of access, and making that visible adds helpful context for readers.
Transparency has always been central to the EDR Telemetry Project. Evaluations may involve different levels of access, and making that visible adds helpful context for readers.
Cisco shows strength in prevention, indicator alerting, and response automation, with solid investigation visuals and well-documented APIs that integrate easily into broader security stacks. It’s a platform that leans more...
Cisco shows strength in prevention, indicator alerting, and response automation, with solid investigation visuals and well-documented APIs that integrate easily into broader security stacks. It’s a platform that leans more...
𝗪𝗵𝗮𝘁’𝘀 𝗰𝗼𝗺𝗶𝗻𝗴 𝗻𝗲𝘅𝘁:
𝗪𝗵𝗮𝘁’𝘀 𝗰𝗼𝗺𝗶𝗻𝗴 𝗻𝗲𝘅𝘁:
They’re related, but they solve completely different problems. Telemetry 𝗶𝘀 𝗼𝗻𝗲 𝗽𝗶𝗲𝗰𝗲 𝗼𝗳 𝘁𝗵𝗲 𝗽𝘂𝘇𝘇𝗹𝗲. The comparison service 𝗹𝗼𝗼𝗸𝘀 𝗮𝘁 𝘁𝗵𝗲 𝗲𝗻𝘁𝗶𝗿𝗲 𝘀𝗼𝗹𝘂𝘁𝗶𝗼𝗻.
They’re related, but they solve completely different problems. Telemetry 𝗶𝘀 𝗼𝗻𝗲 𝗽𝗶𝗲𝗰𝗲 𝗼𝗳 𝘁𝗵𝗲 𝗽𝘂𝘇𝘇𝗹𝗲. The comparison service 𝗹𝗼𝗼𝗸𝘀 𝗮𝘁 𝘁𝗵𝗲 𝗲𝗻𝘁𝗶𝗿𝗲 𝘀𝗼𝗹𝘂𝘁𝗶𝗼𝗻.
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
On that note...there are many fake POCs circulating. Be careful what you run. A POC is not available yet.
On that note...there are many fake POCs circulating. Be careful what you run. A POC is not available yet.
The platform now supports official pySigma validation fully in-browser, compiled to WebAssembly. Same validation as sigma-cli. Thanks to @sifex from detection.studio for the inspiration behind the implementation.
Here’s what we added:👇
The platform now supports official pySigma validation fully in-browser, compiled to WebAssembly. Same validation as sigma-cli. Thanks to @sifex from detection.studio for the inspiration behind the implementation.
Here’s what we added:👇
I put together a full deep dive walking through our process, the tooling we use, and how we score everything based on direct telemetry.
I put together a full deep dive walking through our process, the tooling we use, and how we score everything based on direct telemetry.
Check it out and let me know what you think - www.edr-telemetry.com
Check it out and let me know what you think - www.edr-telemetry.com
I'm rt is way more useful for investigations. Drop in a bot token from malware and see threat actor comms directly from a clean web interface.
Demo video attached. Let me know your thoughts!
I'm rt is way more useful for investigations. Drop in a bot token from malware and see threat actor comms directly from a clean web interface.
Demo video attached. Let me know your thoughts!
Big update for anyone working on network detections.
𝗜𝗻𝗰𝗹𝘂𝗱𝗲𝗱:
• 45k+ ET rules available out of the box
• Full ET Open ruleset preloaded
• Build and validate custom Suricata rules
Big update for anyone working on network detections.
𝗜𝗻𝗰𝗹𝘂𝗱𝗲𝗱:
• 45k+ ET rules available out of the box
• Full ET Open ruleset preloaded
• Build and validate custom Suricata rules
Full writeup ➡️ blog.cloudflare.com/18-november-...
Full writeup ➡️ blog.cloudflare.com/18-november-...