<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>SOC Analyst Hub</title><description>Detection Engineering Intelligence for SOC Teams</description><link>https://blueteambrief.com/</link><language>en-us</language><item><title>Detecting BYOVD: How to Hunt Ransomware EDR Killers Before They Blind Your Stack</title><link>https://blueteambrief.com/articles/detecting-byovd-edr-killer-attacks/</link><guid isPermaLink="true">https://blueteambrief.com/articles/detecting-byovd-edr-killer-attacks/</guid><description>Bring Your Own Vulnerable Driver (BYOVD) attacks let ransomware affiliates kill EDR at kernel level. This guide covers detection logic, Sigma rules, and KQL queries to catch BYOVD before your defences are silenced.</description><pubDate>Sat, 23 May 2026 00:00:00 GMT</pubDate><category>detection-guide</category><category>BYOVD</category><category>EDR killer</category><category>ransomware</category><category>kernel driver</category><category>DragonForce</category><category>Akira</category><category>T1562.001</category><category>Sigma</category><category>KQL</category><category>endpoint detection</category></item><item><title>Detecting Malicious PowerShell Execution — From Script Block Logging to AMSI</title><link>https://blueteambrief.com/articles/detecting-malicious-powershell-execution/</link><guid isPermaLink="true">https://blueteambrief.com/articles/detecting-malicious-powershell-execution/</guid><description>PowerShell remains one of the most abused tools in the attacker&apos;s arsenal. This guide covers the full detection stack — script block logging, module logging, transcription, AMSI, and Sigma rules for hunting obfuscated and encoded commands.</description><pubDate>Fri, 22 May 2026 00:00:00 GMT</pubDate><category>detection-guide</category><category>powershell</category><category>script-block-logging</category><category>amsi</category><category>sigma</category><category>windows</category><category>T1059.001</category><category>obfuscation</category><category>living-off-the-land</category></item><item><title>Hunting Living-Off-the-Land Binaries: certutil, mshta, regsvr32, and wscript</title><link>https://blueteambrief.com/articles/hunting-living-off-the-land-binaries-lolbins/</link><guid isPermaLink="true">https://blueteambrief.com/articles/hunting-living-off-the-land-binaries-lolbins/</guid><description>A threat hunt playbook for detecting LOLBin abuse — adversaries using native Windows binaries to execute payloads, download files, and evade detection. Covers certutil, mshta, regsvr32, and wscript with Sigma rules and hunting queries.</description><pubDate>Fri, 28 Nov 2025 00:00:00 GMT</pubDate><category>hunt-playbook</category><category>lolbins</category><category>defense-evasion</category><category>execution</category><category>sigma</category><category>certutil</category><category>mshta</category></item><item><title>Velociraptor for Endpoint Threat Hunting: A Practical Guide</title><link>https://blueteambrief.com/articles/velociraptor-threat-hunting-endpoints/</link><guid isPermaLink="true">https://blueteambrief.com/articles/velociraptor-threat-hunting-endpoints/</guid><description>A hands-on review of Velociraptor for endpoint threat hunting. Covers VQL query language basics, artifact collection, live response, and building custom hunt artifacts for large environments.</description><pubDate>Tue, 18 Nov 2025 00:00:00 GMT</pubDate><category>tool-review</category><category>velociraptor</category><category>dfir</category><category>endpoint</category><category>vql</category><category>threat-hunting</category><category>dfir-tools</category></item><item><title>Detecting C2 Beaconing and DNS Tunneling with Frequency Analysis</title><link>https://blueteambrief.com/articles/detecting-c2-beaconing-dns-tunneling/</link><guid isPermaLink="true">https://blueteambrief.com/articles/detecting-c2-beaconing-dns-tunneling/</guid><description>A deep dive into C2 beaconing detection using statistical analysis of connection timing and DNS query patterns. Learn how to identify beacon sleep intervals, jitter patterns, and DNS exfiltration using log-based analytics.</description><pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate><category>detection-guide</category><category>c2</category><category>dns-tunneling</category><category>beaconing</category><category>network-detection</category><category>threat-hunting</category></item><item><title>Writing Sigma Rules from Scratch: A Practical Guide</title><link>https://blueteambrief.com/articles/sigma-rule-writing-guide-beginners/</link><guid isPermaLink="true">https://blueteambrief.com/articles/sigma-rule-writing-guide-beginners/</guid><description>Learn to write detection rules in Sigma — the vendor-neutral rule format for SIEM detections. Covers logsource types, condition syntax, field mappings, and how to test and tune rules before deploying.</description><pubDate>Sat, 01 Nov 2025 00:00:00 GMT</pubDate><category>detection-guide</category><category>sigma</category><category>detection-engineering</category><category>siem</category><category>rule-writing</category></item><item><title>Threat Hunting Lateral Movement via SMB, PsExec, and WMI</title><link>https://blueteambrief.com/articles/threat-hunting-lateral-movement-smb/</link><guid isPermaLink="true">https://blueteambrief.com/articles/threat-hunting-lateral-movement-smb/</guid><description>A structured threat hunt playbook for identifying lateral movement activity using SMB-based tooling. Covers PsExec, Impacket, WMI execution, and the network and host artifacts each leaves behind.</description><pubDate>Wed, 22 Oct 2025 00:00:00 GMT</pubDate><category>hunt-playbook</category><category>lateral-movement</category><category>psexec</category><category>wmi</category><category>smb</category><category>impacket</category></item><item><title>Detecting LSASS Credential Dumping on Windows</title><link>https://blueteambrief.com/articles/detecting-lsass-credential-dumping-windows/</link><guid isPermaLink="true">https://blueteambrief.com/articles/detecting-lsass-credential-dumping-windows/</guid><description>A practical detection guide for identifying Mimikatz, procdump, and other tools targeting LSASS memory. Covers Sysmon events, Windows Security logs, and Sigma rules you can deploy today.</description><pubDate>Wed, 15 Oct 2025 00:00:00 GMT</pubDate><category>detection-guide</category><category>credential-access</category><category>mimikatz</category><category>lsass</category><category>sysmon</category><category>sigma</category></item></channel></rss>