Open in app

Sign in

Write

Sign in

Dan Lussier
Dan Lussier

52 Followers

Home

About

Practical Use Cases for LLM’s in cyber security (part 1)

I want to start this off by stating, I am not a developer. I’ve written very little code myself (some small PHP ticket-system style…

Nov 26, 2024
1
Practical Use Cases for LLM’s in cyber security (part 1)
Practical Use Cases for LLM’s in cyber security (part 1)
Nov 26, 2024
1

Chronicle Detection As Code with Google IDX and GitHub

After recently reading the awesome two-part series by David French (part 1 and part 2) I decided to take his work for a spin. I identified…

Feb 20, 2024
Chronicle Detection As Code with Google IDX and GitHub
Chronicle Detection As Code with Google IDX and GitHub
Feb 20, 2024

Hashed and rehashed a tale of Goodware hashes

I was looking for a service that offered goodware hashes for a project related to SOAR automation, but I couldn’t find one. So, I decided…

Oct 29, 2023
Hashed and rehashed a tale of Goodware hashes
Hashed and rehashed a tale of Goodware hashes
Oct 29, 2023

Detecting Malicious C2 Activity — SpawnAs & SMB Lateral Movement in CobaltStrike

Understanding common attack vectors and how threat actors move in your environment post-compromise is critical to identifying what kind of…

Jan 15, 2021
Detecting Malicious C2 Activity — SpawnAs & SMB Lateral Movement in CobaltStrike
Detecting Malicious C2 Activity — SpawnAs & SMB Lateral Movement in CobaltStrike
Jan 15, 2021

Detecting Malicious C2 Activity with EDR Telemetry

Investigating post-compromise activity, be it simulated or real, with EDR logs can be extremely beneficial to building out advanced…

Jan 2, 2021
Detecting Malicious C2 Activity with EDR Telemetry
Detecting Malicious C2 Activity with EDR Telemetry
Jan 2, 2021
Dan Lussier

Dan Lussier

52 Followers

Information Security

Help

Status

About

Careers

Press

Blog

Privacy

Terms

Text to speech

Teams