• Home
  • Blog
  • AlphaHunt Intelligence
CSIRTGadgets

Threat Feeds Based on Architecture- Not Indicators

Threat Feeds Based on Architecture- Not Indicators

Think about the problem you’re actually trying to solve- not the indicators themselves. Indicators for the sake of indicators is just plain…

Hunting Through Your Home Network with ElastiFlow

Hunting Through Your Home Network with ElastiFlow

Keep it simple. Start with Netflow…

How to Build a Faster IOC

How to Build a Faster IOC

My IOCs can speak natively with your API….

Hunting for malicious connections using Python and TensorFlow

Hunting for malicious connections using Python and TensorFlow

This takes #IDS and #Netflow anomaly detection to a whole new level…

Deploying Threat Intel with Slack

Deploying Threat Intel with Slack

The single fastest way to get your threat intel out of slack and into your..

Developing Threat Intel with Slack

Developing Threat Intel with Slack

Wouldn’t it be cool, if your IDS could start hunting automatically.. simply by paying attention to your #ops channel?

Did you learn something new?
 

Categories

cif csirtg marketing rant research smrt tools
  • Contact
  • AlphaHunt Intelligence
© 2024 CSIRT Gadgets, LLC
All rights reserved