filter: 8 entries
Detection Guide T1562.001 2026-05-23
Detecting BYOVD: How to Hunt Ransomware EDR Killers Before They Blind Your Stack
Bring Your Own Vulnerable Driver (BYOVD) attacks let ransomware affiliates kill EDR at kernel level. This guide covers detection logic, Sigma rules, and KQL queries to catch BYOVD before your defences are silenced.
Detection Guide T1059.001 2026-05-22
Detecting Malicious PowerShell Execution — From Script Block Logging to AMSI
PowerShell remains one of the most abused tools in the attacker's arsenal. This guide covers the full detection stack — script block logging, module logging, transcription, AMSI, and Sigma rules for hunting obfuscated and encoded commands.
Hunt Playbook T1218 2025-11-28
Hunting Living-Off-the-Land Binaries: certutil, mshta, regsvr32, and wscript
A threat hunt playbook for detecting LOLBin abuse — adversaries using native Windows binaries to execute payloads, download files, and evade detection. Covers certutil, mshta, regsvr32, and wscript with Sigma rules and hunting queries.
Tool Review 2025-11-18
Velociraptor for Endpoint Threat Hunting: A Practical Guide
A hands-on review of Velociraptor for endpoint threat hunting. Covers VQL query language basics, artifact collection, live response, and building custom hunt artifacts for large environments.
Detection Guide 2025-11-10
Detecting C2 Beaconing and DNS Tunneling with Frequency Analysis
A deep dive into C2 beaconing detection using statistical analysis of connection timing and DNS query patterns. Learn how to identify beacon sleep intervals, jitter patterns, and DNS exfiltration using log-based analytics.
Detection Guide 2025-11-01
Writing Sigma Rules from Scratch: A Practical Guide
Learn to write detection rules in Sigma — the vendor-neutral rule format for SIEM detections. Covers logsource types, condition syntax, field mappings, and how to test and tune rules before deploying.
Hunt Playbook 2025-10-22
Threat Hunting Lateral Movement via SMB, PsExec, and WMI
A structured threat hunt playbook for identifying lateral movement activity using SMB-based tooling. Covers PsExec, Impacket, WMI execution, and the network and host artifacts each leaves behind.
Detection Guide T1003.001 2025-10-15
Detecting LSASS Credential Dumping on Windows
A practical detection guide for identifying Mimikatz, procdump, and other tools targeting LSASS memory. Covers Sysmon events, Windows Security logs, and Sigma rules you can deploy today.