With this post we are getting nearly to the end of these series of memory analyis with Vshot and Remnux. In this post we are covering some of the plugins to detect the most targeted and stealthy attacks you can find today out there. More often than in previous years, I am coming across more…
Tag: SOC
Network Threat Hunting Books
Here I leave you what are the best books I have ever read for network threat hunting – security monitoring. These books at the time I read them help me to get back on my feet after some long time without firing wireshark and seeing and nice packet capture. I recommend them as they…
How to define and build an effective Cyber Threat Intelligence Capability by Henry Dalziel and Eric Olson.
Have you heard all the buzz around threat intelligence? This book will explain CTI in plain english. It is a very simple book to read and I believe it is not only useful for technical people but also for Managers and Sales. Whether you need to implement a threat intelligence program or sell your organization’s…
Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges
This is another awesome book I recently found trying to validate some knowledge for my next blog post. This is the definitive book to understand today’s malware distribution networks and how they operate. I have spent a considerable amount of time researching and working with technologies aimed at recognizing Malware Delivery Networks and this is…
Book: Ten strategies of a world-class Cybersecurity Operations Center
This is the last book I just finished reading, I am going to be honest with you it is a very tedious book to read if you are not new to the field however I do not want to undervalue the book as it is a very important source of knowledge for those in the…