top of page
Harisuthan
May 15, 20232 min read
Sooty SOC Analyst tool 101
Tools are essential for SOC (Security Operations Center) analysts because they enable them to detect, analyze, and respond to security...
385 views0 comments
Harisuthan
Jan 13, 20239 min read
Advance port scan detection using ChatGPT
Adversaries/Attackers keeps on spending lots of time at information gathering, it's basically starts with an port or and network scan,...
461 views0 comments
Harisuthan
Jan 10, 20232 min read
Port scan detection using CHATGPT
SIEM query for Port Scan detection using CHATGPT, this specific technology helps the security team to build some base line detection rule...
737 views0 comments
Harisuthan
Jul 15, 20221 min read
Threat Hunting Loop
Threat Hunting is basically defined as a hypothesis-based proactive detection of malicious activity, where we replicate or build an...
116 views0 comments
Harisuthan
Jun 23, 20221 min read
Working Of Threat Hunting
Team threat hunters are front-line defenders who proactively detect malicious or suspicious activity by investigating internal systems in...
159 views0 comments
Harisuthan
Jun 10, 20222 min read
Pyramid of pain
Pyramid of pain is a threat hunting cookbook used by the threat hunters to investigate or determine cyber threats, it's a combination of...
199 views0 comments
Harisuthan
Jun 6, 20221 min read
Basic Of Cyber Threat Hunting
In recent trends, many adversaries remain hidden in an organization for a month before detection it has been too challenging for many...
144 views0 comments
Keerthana Partheeban
May 29, 20222 min read
Cyber Threat Intelligence
Organizations face a lot of threats in their day-to-day basics. Cyber threat intelligence is the evidence-based knowledge about existing...
92 views0 comments
bottom of page