Testing in Detection Engineering (Part 8)

Testing in Detection Engineering (Part 8)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. This blog involved one more anonymous contributor.Testing the pens...In this blog (#8 in the ...
Blueprint for Threat Intel to Detection Flow (Part 7)

Blueprint for Threat Intel to Detection Flow (Part 7)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#7 in the series), we will cover more details on the ...
Cooking Intelligent Detections from Threat Intelligence (Part 6) [Medium Backup]

Cooking Intelligent Detections from Threat Intelligence (Part 6) [Medium Backup]

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#6 in the series), we will covers some DOs and DON’Ts ...
Cooking Intelligent Detections from Threat Intelligence (Part 6)

Cooking Intelligent Detections from Threat Intelligence (Part 6)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#6 in the series), we will covers some DOs and DON’Ts ...
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 11: Functional CompositionIntroductionWelcome back to part 11 of the On Detection blog series. This next article serves as a conceptual foundation upon which we will build over the next few posts ...
Domain of Thrones: Part II

Domain of Thrones: Part II

Written by Nico Shyne & Josh PragerIntroduction Part IIIn the first installment of “Domain of Thrones,” we meticulously explored an array of six distinctive domain persistence techniques:Credential Theft on the Domain Controller (DC)NTDS AccessDCSyncGolden ...
Frameworks for DE-Friendly CTI (Part 5)  [Medium Backup]

Frameworks for DE-Friendly CTI (Part 5) [Medium Backup]

 This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#5 in the series), we will build a quick “framework-lite” for making CTI ...
Frameworks for DE-Friendly CTI (Part 5)

Frameworks for DE-Friendly CTI (Part 5)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#5 in the series), we will build a quick “framework-lite” for ...
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 10: Implicit Process CreateIntroductionWelcome back to another installment of the On Detection: Tactical to Functional series. In the previous article, I argued that we perceive actions within our environment at the Operational ...

Detection Engineering is Painful — and It Shouldn’t Be (Part 1) [Medium Backup]

 This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.This post is our first installment in the “Threats into Detections — The DNA of Detection Engineering” series, ...