Open in app

Sign in

Write

Sign in

Mastodon
mthcht
mthcht

799 followers

Home

Lists

About

Detect FYI

Published in

Detect FYI

Threat Hunting - Suspicious Named pipes

Jul 22, 2024
Threat Hunting - Suspicious Named pipes
Threat Hunting - Suspicious Named pipes
Jul 22, 2024
Detect FYI

Published in

Detect FYI

Event Log Manipulations - Time slipping

After reading Alex’s latest article, I’m inspired to start a detection serie dedicated to Event Log manipulation techniques, with our first…

Jan 13, 2024
Event Log Manipulations - Time slipping
Event Log Manipulations - Time slipping
Jan 13, 2024
Detect FYI

Published in

Detect FYI

Threat Hunting — Suspicious Windows Service Names

Simulation and Detection

Jan 8, 2024
2
Threat Hunting — Suspicious Windows Service Names
Threat Hunting — Suspicious Windows Service Names
Jan 8, 2024
2
Detect FYI

Published in

Detect FYI

Threat Hunting - Suspicious User Agents

Hunting for Suspicious User Agents with Splunk

Jan 1, 2024
2
Threat Hunting - Suspicious User Agents
Threat Hunting - Suspicious User Agents
Jan 1, 2024
2
Detect FYI

Published in

Detect FYI

Detecting DNS over HTTPS

Detecting DNS over HTTPS - DoH with a SIEM - logs analysis

Nov 7, 2023
1
Detecting DNS over HTTPS
Detecting DNS over HTTPS
Nov 7, 2023
1
Detect FYI

Published in

Detect FYI

Threat Hunting - Suspicious TLDs

Nov 3, 2023
1
Threat Hunting - Suspicious TLDs
Threat Hunting - Suspicious TLDs
Nov 3, 2023
1
OSINT Team

Published in

OSINT Team

Catching My Hacker via Leaked Databases

How i got hacked and tracked the hacker with leaked databases

Oct 4, 2023
2
Catching My Hacker via Leaked Databases
Catching My Hacker via Leaked Databases
Oct 4, 2023
2
Detect FYI

Published in

Detect FYI

Detect DLL Hijacking techniques from HijackLibs with Splunk

Splunk detections searches

Oct 1, 2023
Detect DLL Hijacking techniques from HijackLibs with Splunk
Detect DLL Hijacking techniques from HijackLibs with Splunk
Oct 1, 2023

The Myths and Realities of VPNs

Have you also noticed the aggressive advertising campaigns for VPN providers, promoted by social media influencers and YouTube creators …

Sep 30, 2023
The Myths and Realities of VPNs
The Myths and Realities of VPNs
Sep 30, 2023
Detect FYI

Published in

Detect FYI

How Threat Actors use Pastebin

Why is it important to monitor paste sites? detection tips

Aug 24, 2023
How Threat Actors use Pastebin
How Threat Actors use Pastebin
Aug 24, 2023
mthcht

mthcht

799 followers

Threat Hunting - DFIR - Detection Engineering

Following
  • ShadowByte

    ShadowByte

  • Cyber Sundae DFIR

    Cyber Sundae DFIR

  • Rogier Dijkman

    Rogier Dijkman

  • Dane Stuckey

    Dane Stuckey

  • delivr.to

    delivr.to

See all (64)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech