Introduction A cyber “drop the mic” moment consumed the time, effort, and resources for nearly all security teams this December (2021). A critical vulnerability in a java package called log4j was disclosed under the pseudonym log4shell. If you haven’t read about it, where have you been!? I am not going to go into the detailsContinue reading “Simplistic Log4j Investigation”
Category Archives: Articles
Threat Hunting: Where to take aim…
In this post, we will expand into the types of analysis required when hunting, keeping it basic and building on the overview explained in part 1 of this series. One of the common questions SOC teams face when building out a Threat Hunting capability into an organisation or operation is; “Where do I look?” IfContinue reading “Threat Hunting: Where to take aim…”
HACKED: Facebook…
The headlines exploded yesterday with the news that technology and social media giant Facebook have suffered a security breach impacting roughly 50 million users. The whole world is now watching… “On the afternoon of Tuesday, September 25, our engineering team discovered a security issue affecting almost 50 million accounts. We’re taking this incredibly seriously andContinue reading “HACKED: Facebook…”
Threat Hunting: Survival of the Fittest
Threat Hunting. What is it? Why do I need to do it? How do I get started? Over the next few weeks I am hoping to write a number of articles looking at the aspect of threat hunting. Essentially to give a sound overview for someone who has never heard of the term before, orContinue reading “Threat Hunting: Survival of the Fittest”