Articles by Tag #threathunting

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Credential Dumping: LSASS Memory Dump Detection

What is LSA/LSASS? LSA (Local Security Authority) is a component of Windows that enforces...

Learn More 2 0Nov 6 '24

Advanced Persistent Threats (APT): Threat Hunting Methodologies

Advanced Persistent Threats (APT): Threat Hunting Methodologies Executive...

Learn More 1 0Aug 10

Can Hybrid SOC Services stop advanced threats?

Hybrid SOC services combine the capabilities of in-house security teams with the expertise and...

Learn More 1 0Aug 5

What is Memory Forensics?

What is Memory Forensics? Memory forensics, or RAM forensics, involves analyzing a...

Learn More 1 0Apr 11

Network Security Monitoring - Advanced Detection and Response

# Network Security Monitoring: Advanced Detection and Response ## Introduction Network Security Monitoring (NSM) provides comprehensive visibility i...

Learn More 1 0Aug 11

Credential Dumping: NTDS.dit Dump Detection

Introduction In the first two parts of this series, we explored credential dumping...

Learn More 0 0Nov 6 '24

Fix It Before They Break It: The True Role of Vulnerability Management

Before we start let's understand a few keywords Vulnerability: Vulnerability is always defined by...

Learn More 0 0Mar 11

Types of Threat Hunting

Threat hunting is essential to the network, endpoint, and data security measures because cyber...

Learn More 0 0Jan 21

Level Up Your Blue Team Skills with SOCLabs 🚀

Cybersecurity is not just about building firewalls or patching systems. For blue team...

Learn More 0 0Aug 22

Credential Dumping: NTLM Hash Dump

What is NTLM? NTLM (NT LAN Manager) is a suite of Microsoft security protocols designed to...

Learn More 0 0Nov 6 '24