• Home
  • Blog
  • AlphaHunt Intelligence
CSIRTGadgets

The Cutting Edge of eCrime Research is...

The Cutting Edge of eCrime Research is...

If you haven’t checked out THE eCrime conference, you’re…

Threat Feeds Based on Architecture- Not Indicators

Threat Feeds Based on Architecture- Not Indicators

Think about the problem you’re actually trying to solve- not the indicators themselves. Indicators for the sake of indicators is just plain…

Finding The Needle in the Needle Stack using 6th Grade Math

Finding The Needle in the Needle Stack using 6th Grade Math

Nothing hooks a zombie- like a brain on a stick.

Hunting Through Your Home Network with ElastiFlow

Hunting Through Your Home Network with ElastiFlow

Keep it simple. Start with Netflow…

Hunting Through Spam with ElasticSearch

Hunting Through Spam with ElasticSearch

With the right set of tools, your spam can actually be a profit center…

Writing Your Own HoneyNet

Writing Your Own HoneyNet

Most services on the Internet… started out as honeypots.

Combat Automation in OPSEC - Getting REAL Concurrency out of Python3 with ZeroMQ

Combat Automation in OPSEC - Getting REAL Concurrency out of Python3 with ZeroMQ

If you’re trying to build a Threat Intel platform with threads, you’re probably doing it wrong… Here’s why…

Did you learn something new?
 

Categories

cif csirtg marketing rant research smrt tools
Newer Older
  • Contact
  • AlphaHunt Intelligence
© 2024 CSIRT Gadgets, LLC
All rights reserved