Practical Use Cases for LLM’s in cyber security (part 1)I want to start this off by stating, I am not a developer. I’ve written very little code myself (some small PHP ticket-system style…Nov 26, 20241Nov 26, 20241
Chronicle Detection As Code with Google IDX and GitHubAfter recently reading the awesome two-part series by David French (part 1 and part 2) I decided to take his work for a spin. I identified…Feb 20, 2024Feb 20, 2024
Hashed and rehashed a tale of Goodware hashesI was looking for a service that offered goodware hashes for a project related to SOAR automation, but I couldn’t find one. So, I decided…Oct 29, 2023Oct 29, 2023
Detecting Malicious C2 Activity — SpawnAs & SMB Lateral Movement in CobaltStrikeUnderstanding common attack vectors and how threat actors move in your environment post-compromise is critical to identifying what kind of…Jan 15, 2021Jan 15, 2021
Detecting Malicious C2 Activity with EDR TelemetryInvestigating post-compromise activity, be it simulated or real, with EDR logs can be extremely beneficial to building out advanced…Jan 2, 2021Jan 2, 2021