detect.fyi
Open in
urlscan Pro
162.159.152.4
Public Scan
Submitted URL: http://detect.fyi/
Effective URL: https://detect.fyi/?gi=20413c4e4483
Submission: On March 05 via manual from US — Scanned from DE
Effective URL: https://detect.fyi/?gi=20413c4e4483
Submission: On March 05 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy. Homepage Open in app Sign inGet started DETECTION ENGINEERING COLLECTIVE WE WALK THE WALK. INSIGHTS AND TIPS FROM THE FIELD—FROM ACTUAL CYBERSECURITY PRACTITIONERS. Trending StoriesAbout FollowFollowing Latest Stories Unsupervised Machine Learning with Splunk: the cluster command UNSUPERVISED MACHINE LEARNING WITH SPLUNK: THE CLUSTER COMMAND If you are in cyber for long, you should have probably heard this one: Alex Teixeira Feb 19 Building a beginner’s detection lab with Defender, Sentinel, and Splunk BUILDING A BEGINNER’S DETECTION LAB WITH DEFENDER, SENTINEL, AND SPLUNK If you work in an MSSP as an analyst or consult a lot, you’ll likely come in contact with SIEMs, EDRs, and data sources that are new… Regan Jan 17 Event Log Manipulations [1] - Time slipping EVENT LOG MANIPULATIONS [1] - TIME SLIPPING After reading Alex’s latest article, I’m inspired to start a detection serie dedicated to Event Log manipulation techniques, with our first… mthcht Jan 13 Ivanti — Zero Day vulnerabilities, BSI Translation and Technical Deep Analysis IVANTI — ZERO DAY VULNERABILITIES, BSI TRANSLATION AND TECHNICAL DEEP ANALYSIS Latest BSI alert and additional Technical Analysis Simone Kraus Jan 12 Under the Radar: Your Detections are missing logs — every single run UNDER THE RADAR: YOUR DETECTIONS ARE MISSING LOGS — EVERY SINGLE RUN In case you've been developing custom detection content for a while, you likely know what is one of the most critical steps during the… Alex Teixeira Jan 9 Threat Hunting — Suspicious Windows Service Names THREAT HUNTING — SUSPICIOUS WINDOWS SERVICE NAMES Simulation and Detection mthcht Jan 8 An introduction to building an effective Detection Engineering Capability AN INTRODUCTION TO BUILDING AN EFFECTIVE DETECTION ENGINEERING CAPABILITY Detection Engineering is a relatively new practice within blue teams and MSSPs, which has only recently garnered popularity amongst the… Regan Jan 2 Threat Hunting - Suspicious User Agents THREAT HUNTING - SUSPICIOUS USER AGENTS Hunting for Suspicious User Agents with Splunk mthcht Dec 31, 2023 🦅 Hunting with Hayabusa — Tool showcase 🦅 HUNTING WITH HAYABUSA — TOOL SHOWCASE Features Christian Henriksen Dec 11, 2023 Hunting Malicious Infrastructure-Headers and Hardcoded/Static Strings HUNTING MALICIOUS INFRASTRUCTURE-HEADERS AND HARDCODED/STATIC STRINGS In my last blog Hunting Malicious Infrastructure using JARM and HTTP Response Michael Koczwara Dec 5, 2023 Detecting DNS over HTTPS DETECTING DNS OVER HTTPS Detecting DNS over HTTPS - DoH with a SIEM - logs analysis mthcht Nov 7, 2023 Trending Stories Alex Teixeira Aug 30, 2023 -------------------------------------------------------------------------------- FIVE LESSONS I LEARNED FROM BUILDING ANOMALY-BASED THREAT DETECTION Read more… 106 2 responses Michael Koczwara May 16, 2023 -------------------------------------------------------------------------------- HUNTING MALICIOUS INFRASTRUCTURE USING JARM AND HTTP RESPONSE Read more… 98 1 response Detect FYI Threat Detection Engineering and DFIR Insights More information Followers 536 Elsewhere About Detect FYILatest StoriesArchiveAbout MediumTermsPrivacyTeams