Effective Threat Hunting
Recon Main Blog
2024-09-27 23:24:12
收藏
This post was written by Luke Rusten, our Director of Security Operations, and was originally published on his personal Substack. In this article, Luke delves into his approach to threat hunting, walking through a detailed example. Threat hunting is central to Recon’s security operations strategy, and Luke’s leadership continues to strengthen our threat detection and response capabilities.
目录
最新
- Every Pentest Makes us Better
- Delivering AI Superpowers to Security Teams: Introducing Recon Labs
- Microsoft Teams Social Engineering: A Ransomware Attack Vector
- Mastering Threat Hunting Operations: A Deep Dive into Recon InfoSec’s Approach
- Prolific Phishing Campaign Leveraging Zoom's Infrastructure
- Detecting Fake CAPTCHA Campaigns: ClickFix, ClearFake, and Etherhide
- SigmaHQ Essentials - Building Robust Detection Capabilities - Part 2
- Effective Threat Hunting