Articles by Tag #threathunting

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

#DAY 4: The Field Agent

Deploying the Universal Forwarder & Establishing a Secure Connection Intoduction Day 4...

Learn More 3 0Sep 10

Credential Dumping: LSASS Memory Dump Detection

What is LSA/LSASS? LSA (Local Security Authority) is a component of Windows that enforces...

Learn More 2 0Nov 6 '24

What is Memory Forensics?

What is Memory Forensics? Memory forensics, or RAM forensics, involves analyzing a...

Learn More 1 0Apr 11

Network Security Monitoring - Advanced Detection and Response

# Network Security Monitoring: Advanced Detection and Response ## Introduction Network Security Monitoring (NSM) provides comprehensive visibility i...

Learn More 1 0Aug 11

Advanced Persistent Threats (APT): Threat Hunting Methodologies

Advanced Persistent Threats (APT): Threat Hunting Methodologies Executive...

Learn More 1 0Aug 10

Introducing osquery_hunter — Lightweight Windows Triage Tool for DFIR & Threat Hunting

osquery_hunter helps security professionals quickly triage Windows systems using osquery. Ideal for DFIR and incident response when full EDR isn't available.

Learn More 1 1Oct 18

A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

Introduction I recently conducted a thorough study of a sophisticated assault campaign...

Learn More 1 2Aug 29

Can Hybrid SOC Services stop advanced threats?

Hybrid SOC services combine the capabilities of in-house security teams with the expertise and...

Learn More 1 0Aug 5

Fix It Before They Break It: The True Role of Vulnerability Management

Before we start let's understand a few keywords Vulnerability: Vulnerability is always defined by...

Learn More 0 0Mar 11

Types of Threat Hunting

Threat hunting is essential to the network, endpoint, and data security measures because cyber...

Learn More 0 0Jan 21

Credential Dumping: NTDS.dit Dump Detection

Introduction In the first two parts of this series, we explored credential dumping...

Learn More 0 0Nov 6 '24

Credential Dumping: NTLM Hash Dump

What is NTLM? NTLM (NT LAN Manager) is a suite of Microsoft security protocols designed to...

Learn More 0 0Nov 6 '24

Threat Hunting With ZoomEye 2025

In the ever-evolving landscape of cybersecurity, threat hunting has become a cornerstone of proactive...

Learn More 0 0Sep 24

The Rise of Offensive AI: How Adversaries are Weaponizing Machine Learning

For decades, the archetype of the cyber adversary has been the shadowy hacker in a dark room, a lone...

Learn More 0 0Sep 28

Level Up Your Blue Team Skills with SOCLabs 🚀

Cybersecurity is not just about building firewalls or patching systems. For blue team...

Learn More 0 0Aug 22