SigmaHQ Essentials - Building Robust Detection Capabilities - Part 2
Recon Main Blog
2024-10-02 04:44:41
收藏
Hello again! I'm back with part 2 of Building Robust Detection Capabilities. Last time, we dove into the awesomeness of the SigmaHQ detection repository, covering what Sigma HQ detections are, their usage, and formatting. Now, let’s get practical and explore how to craft these detections using logs from your environment. Content warning: This post will dive deep into the nerdiness of detection engineering, packed with details you might find useful.
目录
最新
- Every Pentest Makes us Better
- Delivering AI Superpowers to Security Teams: Introducing Recon Labs
- Microsoft Teams Social Engineering: A Ransomware Attack Vector
- Mastering Threat Hunting Operations: A Deep Dive into Recon InfoSec’s Approach
- Prolific Phishing Campaign Leveraging Zoom's Infrastructure
- Detecting Fake CAPTCHA Campaigns: ClickFix, ClearFake, and Etherhide
- SigmaHQ Essentials - Building Robust Detection Capabilities - Part 2
- Effective Threat Hunting