Threat Hunting Scenario
Threat Hunting Scenario are different hunt techniques that a threat hunter will follow. All hunting scenarios are based on the… read out Threat Hunting Scenario
Principal Components of Security Information Event Management
Principal Components of Security Information Event Management. Description: – Security Information and Event Management (SIEM) permits security team to get… read out Principal Components of Security Information Event Management
Cyber Threat Hunt Cycle
Project Name: Cyber Threat Hunt cycle Description: – Whenever adversary is changing the routine procedure and evade defenses of enterprises Cyber… read out Cyber Threat Hunt Cycle
Discover yourself in New year
Discover yourself in New year Author: Amruta Sadgune / Rohit D Sadgune New year is impending and we have… read out Discover yourself in New year
Indicator of Attack vs Indicator of Compromises
Indicator of Attack vs Indicator of Compromises Project Name: Indicator of Attack vs Indicator of Compromises (IOA vs IOC) Description: – … read out Indicator of Attack vs Indicator of Compromises