Tales of a Cyberscout
Subscribe
Sign in
Home
Notes
Chat
Archive
Leaderboard
About
Latest
Top
Discussions
Can your SOC become a Threat Intel Provider?
From drowning in alerts to producing intel, the SOC's journey. Ditch the grind, beyond alerts, produce intel. Transform your SOC into a strategic intel…
Jan 12
•
Diego Perez
3
Share this post
Tales of a Cyberscout
Can your SOC become a Threat Intel Provider?
Copy link
Facebook
Email
Notes
More
1
A Year in Review: The Tales of a Cyberscout in 2024
From Threat Research Frameworks to Cyber Operations
Jan 5
•
Diego Perez
4
Share this post
Tales of a Cyberscout
A Year in Review: The Tales of a Cyberscout in 2024
Copy link
Facebook
Email
Notes
More
October 2024
Cyber Operations as Git Flows
What if your cybersecurity operations pipeline functioned like a Git repository? Each team acting as a branch, merging their insights and actions into a…
Oct 4, 2024
•
Diego Perez
Share this post
Tales of a Cyberscout
Cyber Operations as Git Flows
Copy link
Facebook
Email
Notes
More
June 2024
Threat Hunting Pyramid of Pain
This article presents a novel approach to threat hunting and analysis called the Intel-Driven Data Analysis (IDDA) Pyramid of Pain. A nine-step process…
Jun 13, 2024
•
Diego Perez
Share this post
Tales of a Cyberscout
Threat Hunting Pyramid of Pain
Copy link
Facebook
Email
Notes
More
April 2024
🔮R1D3 Threat Driven Research Pipeline - Part 2
This article explores the "Analysis" phase of the R1D3 framework, a threat-driven research pipeline. It covers entity and relationship extraction…
Apr 25, 2024
•
Diego Perez
1
Share this post
Tales of a Cyberscout
🔮R1D3 Threat Driven Research Pipeline - Part 2
Copy link
Facebook
Email
Notes
More
🔮R1D3 Threat Driven Research Pipeline - Part 1
We focus on the first phase (Research) of the RIDE active defence framework, emphasizing the importance of efficient research in threat intelligence…
Apr 19, 2024
•
Diego Perez
Share this post
Tales of a Cyberscout
🔮R1D3 Threat Driven Research Pipeline - Part 1
Copy link
Facebook
Email
Notes
More
Things are changing
From OpenSSH backdoors to Antifragile Systems
Apr 14, 2024
•
Diego Perez
Share this post
Tales of a Cyberscout
Things are changing
Copy link
Facebook
Email
Notes
More
February 2024
Threat Hunting vs Detection Engineering? The saga continues ⛵
In this article, we argue that the "Threat Hunting vs Detection Engineering" debate is outdated and doesn't help us improve cybersecurity. We believe…
Feb 6, 2024
•
Diego Perez
Share this post
Tales of a Cyberscout
Threat Hunting vs Detection Engineering? The saga continues ⛵
Copy link
Facebook
Email
Notes
More
November 2023
The Uncertainty of Intelligence and the Entropy of Threats
In Part 1 of this series, we started to lay out the problem space and drew some diėgrams to get a better grasp of them.
Nov 28, 2023
•
Diego Perez
Share this post
Tales of a Cyberscout
The Uncertainty of Intelligence and the Entropy of Threats
Copy link
Facebook
Email
Notes
More
The Problem of Why: Threat-Informed Prioritization in Security Operations.
What does it mean to be threat-informed when it comes to Cyber Defence?
Nov 10, 2023
•
Diego Perez
1
Share this post
Tales of a Cyberscout
The Problem of Why: Threat-Informed Prioritization in Security Operations.
Copy link
Facebook
Email
Notes
More
September 2023
The Threat Hunting Pipeline
Appetizer
Sep 17, 2023
•
Diego Perez
Share this post
Tales of a Cyberscout
The Threat Hunting Pipeline
Copy link
Facebook
Email
Notes
More
Citrix Netscaler CVE-2023-3519 Hunt Mission Plan
The Prelude
Sep 4, 2023
•
Diego Perez
Share this post
Tales of a Cyberscout
Citrix Netscaler CVE-2023-3519 Hunt Mission Plan
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts