Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Detection

Running DeepSeek AI privately using open-source software

Zeek is a powerful open-source network analysis tool that allows users to monitor traffic and detect malicious activities. Users can write packages to detect cybersecurity events, like this GitHub repo that detects C2 from AgentTesla (a well-known malware family). Automating summarization and documentation using AI is often helpful when analyzing Zeek packages.

Why Pen Testing Is Essential in Today's Cyber Threat Landscape

The digital frontier is expanding quickly, with organizations across every industry depending on interconnected systems to communicate, store data, and drive innovation. However, as technology evolves, malicious actors also refine their tactics. This article examines key defenses that protect today's infrastructures.

Optimize EDR logs and route them to SentinelOne with Observability Pipelines

Endpoint detection and response (EDR) systems such as SentinelOne Singularity Endpoint, CrowdStrike, and Microsoft Defender monitor IT infrastructure such as computers, mobile devices, and network devices to detect, alert on, and respond to cyber threats. These EDR systems record data about the endpoints to identify abnormal behavior, block malicious activity, and provide remediation suggestions with contextual information.

Network Traffic Analysis for Data Exfiltration Detection - How Can It Be Done?

“Cybersecurity is much more than a matter of IT; it’s a matter of national security.” – Barack Obama. Data breaches are more than simply an IT concern; they may cause significant financial losses, regulatory fines, and reputational damage. Cybercriminals are always devising new ways to steal sensitive data, making it difficult for security teams to detect and mitigate these threats before they cause serious harm. This is where Network Traffic Analysis (NTA) comes in.

Understanding Identity Threat Detection and Response

One of the largest data breaches of 2024 didn’t require advanced tactics, techniques, and procedures (TTPs), or an escalating chain of successful attacks. It simply required purchasing credentials on the dark web and using them to log in and steal data, once again highlighting the vital need for robust, proactive protection against the growing surge of identity-based attacks.

The Ultimate Guide to Sigma Rules

In cybersecurity as in sports, teamwork makes the dream work. In a world where security analysts can feel constantly bombarded by threat actors, banding together to share information and strategies is increasingly important. Over the last few years, security operations center (SOC) analysts started sharing open source Sigma rules to create and share detections that help them level the playing field.

What are Advanced Persistent Threats (APTs)?

Threat actors often use techniques such as phishing, lateral movement, and zero-days to gain and maintain access to systems. The increased sophistication of advanced persistent threat (APT) groups compared to other attackers means that long-term infiltration, careful exfiltration of data, and manipulation of systems without detection is often observed.

Corelight delivers data aggregation to reduce SIEM ingest by 50-80% compared to legacy network security monitoring tools

According to Forrester Research, “How do we reduce our SIEM ingest costs?” is one of the top inquiries they receive from clients. Many security organizations rely on SIEMs for their detection, investigation, and response workflows, ingesting critical security information and events to detect and respond to threats.

Understand and detect MITRE Caldera with Zeek

MITRE’s Caldera is a cybersecurity platform developed to simulate adversarial tactics, techniques, and procedures (TTPs). Built upon the MITRE ATT&CK framework, Caldera is an open-source tool designed to help cybersecurity professionals and organizations assess their defenses, uncover vulnerabilities, and enhance their overall security posture. By emulating real-world cyber threats, Caldera enables blue teams to test detection and response mechanisms under realistic conditions.

Best Practices for Securing Web Applications Against Modern Threats

Application programming interfaces (APIs) are critical in modern software development. APIs define rules and protocols that enable applications to communicate and share data with other systems. This communication enables developers to leverage the functionality of existing applications rather than recreating those functions and services from scratch. As a result, APIs accelerate software development and enable innovation, collaboration, and automation.