all InfoSec news
Threat Detection
InfoSec Write-ups - Medium infosecwriteups.com
Advent of cyber-2022 day 18
Need of proactive approaches to analyzing different logs, malware and network traffic.
Threat detection involves proactively pursuing and analyzing abnormal activity within an ecosystem to identify malicious signs of compromise or intrusion within a network.
Run your sigma rule(to detect malicious IOC), Write your sigma rule, Create a sigma rule for malicious IOC, View the log details of mal IOC.
Run this command on the exploited machine to check versions of software installed and then …check command compromise cyber cybersecurity detect detection ecosystem exploited find identify intrusion ioc log logs machine malicious malware network network traffic proactive run sigma software threat threat detection threat intelligence traffic tryhackme tryhackme-walkthrough