Breach Detection, Cyber Security, Managed SOC Services 29 Sep 2022 Recent Uber Breach and Lessons Learnt Masarrati
Cyber Security, Machine Learning, Malware Protection, Managed SOC Services 20 Sep 2022 Malware Evasion Techniques and Recommendations for Threat Protection HAWKEYE
Cyber Security, Cyber Threat Intelligence, Machine Learning, Managed Security Services, Managed SOC Services, Security Operations Center, Threat Hunting, Threat Intelligence 19 Sep 2022 Data Exfiltration and Detection through Anomaly Detection HAWKEYE
Cyber Security, Machine Learning, Managed SOC Services, UEBA 11 Sep 2022 Augmenting Traditional UEBA with ML and Deep Learning HAWKEYE
Cyber Security, Security Operations Center 08 Sep 2022 Tools Used for Dumping of RDPCreds via comsvcs.dll HAWKEYE
Cyber Security, Managed SOC Services, Security Operations Center 05 Sep 2022 Sniffing Attacks – Packet Capture Techniques Used by Attackers HAWKEYE
Managed Security Services, Managed SOC Services, Security Operations Center, Threat Hunting 17 Sep 2019 The Basics of Threat Hunting HAWKEYE
Managed Security Services, Managed SOC Services, Security Operations Center, Threat Hunting, Threat Modeling 30 Jun 2019 A Threat Hunt tale HAWKEYE
Managed Security Services, Managed SOC Services, Security Operations Center, Threat Modeling 16 May 2019 Threat Modeling Recipe for a State-of-the-Art SOC HAWKEYE