emacs/var/elfeed/db/data/bb/bb496ba861ba54d9082672748c60e112f80fd0e1
2022-01-03 12:49:32 -06:00

11 lines
2.1 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<p>Ell and Wes sit down to talk with Kyle Hubert and Lou Stella about real world threat hunting. </p><p>Special Guests: Kyle Hubert and Lou Stella.</p><p>Links:</p><ul><li><a href="https://www.youtube.com/watch?v=jy9SAUHEWdU" title="Command Line Threat Hunting Study Group" rel="nofollow">Command Line Threat Hunting Study Group</a>
</li><li><a href="https://www.sans.org/reading-room/whitepapers/analyst/who-what-where-when-effective-threat-hunting-36785" title="“The Who, What, Where, When, Why and How of Effective Threat Hunting” by Robert M. Lee & Rob Lee (Free Account required)" rel="nofollow">“The Who, What, Where, When, Why and How of Effective Threat Hunting” by Robert M. Lee & Rob Lee (Free Account required)</a>
</li><li><a href="https://medium.com/@sqrrldata/the-cyber-hunting-maturity-model-6d506faa8ad5" title="“The Cyber Hunting Maturity Model” from Sqrrl (Now part of AWS)" rel="nofollow">“The Cyber Hunting Maturity Model” from Sqrrl (Now part of AWS)</a>
</li><li><a href="https://attack.mitre.org/matrices/enterprise/" title="MITRE Attack Matrix" rel="nofollow">MITRE Attack Matrix</a>
</li><li><a href="https://attackiq.com/blog/2019/06/26/emulating-attacker-activities-and-the-pyramid-of-pain/" title="David Biancos Pyramid of Pain" rel="nofollow">David Biancos Pyramid of Pain</a>
</li><li><a href="https://danielmiessler.com/study/purple-team/" title="The Definition of a Purple Team" rel="nofollow">The Definition of a Purple Team</a>
</li><li><a href="https://danielmiessler.com/study/red-blue-purple-teams/" title="The Difference Between Red, Blue, and Purple Teams" rel="nofollow">The Difference Between Red, Blue, and Purple Teams</a>
</li><li><a href="https://gitlab.com/aptgetKubert/2019_tcs_threat_intelligence" title="2019 Texas Cyber Summit Presentation and Resources" rel="nofollow">2019 Texas Cyber Summit Presentation and Resources</a>
</li><li><a href="https://github.com/hslatman/awesome-threat-intelligence" title="A Curated List of Awesome Threat Intelligence Resources" rel="nofollow">A Curated List of Awesome Threat Intelligence Resources</a>
</li></ul>