detect.fyi Open in urlscan Pro
162.159.152.4  Public Scan

Submitted URL: http://detect.fyi/
Effective URL: https://detect.fyi/?gi=20413c4e4483
Submission: On March 05 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

To make Medium work, we log user data. By using Medium, you agree to our Privacy
Policy, including cookie policy.

Homepage
Open in app
Sign inGet started



DETECTION ENGINEERING COLLECTIVE


WE WALK THE WALK. INSIGHTS AND TIPS FROM THE FIELD—FROM ACTUAL CYBERSECURITY
PRACTITIONERS.


Trending StoriesAbout
FollowFollowing
Latest Stories
Unsupervised Machine Learning with Splunk: the cluster command
UNSUPERVISED MACHINE LEARNING WITH SPLUNK: THE CLUSTER COMMAND

If you are in cyber for long, you should have probably heard this one:
Alex Teixeira
Feb 19
Building a beginner’s detection lab with Defender, Sentinel, and Splunk
BUILDING A BEGINNER’S DETECTION LAB WITH DEFENDER, SENTINEL, AND SPLUNK

If you work in an MSSP as an analyst or consult a lot, you’ll likely come in
contact with SIEMs, EDRs, and data sources that are new…
Regan
Jan 17
Event Log Manipulations [1] - Time slipping
EVENT LOG MANIPULATIONS [1] - TIME SLIPPING

After reading Alex’s latest article, I’m inspired to start a detection serie
dedicated to Event Log manipulation techniques, with our first…
mthcht
Jan 13
Ivanti — Zero Day vulnerabilities, BSI Translation and Technical Deep Analysis
IVANTI — ZERO DAY VULNERABILITIES, BSI TRANSLATION AND TECHNICAL DEEP ANALYSIS

Latest BSI alert and additional Technical Analysis
Simone Kraus
Jan 12
Under the Radar: Your Detections are missing logs — every single run
UNDER THE RADAR: YOUR DETECTIONS ARE MISSING LOGS — EVERY SINGLE RUN

In case you've been developing custom detection content for a while, you likely
know what is one of the most critical steps during the…
Alex Teixeira
Jan 9
Threat Hunting — Suspicious Windows Service Names
THREAT HUNTING — SUSPICIOUS WINDOWS SERVICE NAMES

Simulation and Detection
mthcht
Jan 8
An introduction to building an effective Detection Engineering Capability
AN INTRODUCTION TO BUILDING AN EFFECTIVE DETECTION ENGINEERING CAPABILITY

Detection Engineering is a relatively new practice within blue teams and MSSPs,
which has only recently garnered popularity amongst the…
Regan
Jan 2
Threat Hunting - Suspicious User Agents
THREAT HUNTING - SUSPICIOUS USER AGENTS

Hunting for Suspicious User Agents with Splunk
mthcht
Dec 31, 2023
🦅 Hunting with Hayabusa — Tool showcase
🦅 HUNTING WITH HAYABUSA — TOOL SHOWCASE

Features
Christian Henriksen
Dec 11, 2023
Hunting Malicious Infrastructure-Headers and Hardcoded/Static Strings
HUNTING MALICIOUS INFRASTRUCTURE-HEADERS AND HARDCODED/STATIC STRINGS

In my last blog Hunting Malicious Infrastructure using JARM and HTTP Response
Michael Koczwara
Dec 5, 2023
Detecting DNS over HTTPS
DETECTING DNS OVER HTTPS

Detecting DNS over HTTPS - DoH with a SIEM - logs analysis
mthcht
Nov 7, 2023
Trending Stories
Alex Teixeira
Aug 30, 2023

--------------------------------------------------------------------------------


FIVE LESSONS I LEARNED FROM BUILDING ANOMALY-BASED THREAT DETECTION

Read more…

106
2 responses
Michael Koczwara
May 16, 2023

--------------------------------------------------------------------------------


HUNTING MALICIOUS INFRASTRUCTURE USING JARM AND HTTP RESPONSE

Read more…

98
1 response
Detect FYI
Threat Detection Engineering and DFIR Insights
More information
Followers
536
Elsewhere

About Detect FYILatest StoriesArchiveAbout MediumTermsPrivacyTeams