logo
Blue team
SIEM and threat intelligence/hunting notes
  • Red team
  • Green team
  • Purple team
  • Ty Myrddin
Initializing search
      • Blue team @SOC
        • Network traffic analysis (NTA)
        • Digital forensics and incident response (DFIR)
        • Endpoint detection and response (EDR)
        • Security information and event management (SIEM)
          • SIEM and threat intelligence/hunting notes
            • SIEM & Threat intelligence/hunting notes
            • Incident prevention
            • Threat intelligence lifecycle
            • Pyramid of pain
            • Cyber kill chain
            • MITRE ATT&CK framework
            • Unified kill chain
            • Diamond model
            • Incident handling (NIST)
            • Standards of communication
            • SIEM stack
            • Threat hunting
          • SIEM and threat intelligence/hunting notes
            • SIEM & Threat intelligence/hunting notes
            • Incident prevention
            • Threat intelligence lifecycle
            • Pyramid of pain
            • Cyber kill chain
            • MITRE ATT&CK framework
            • Unified kill chain
            • Diamond model
            • Incident handling (NIST)
            • Standards of communication
            • SIEM stack
            • Threat hunting
          • An investigation with Splunk + CKC
          • TryHackMe rooms
          • Puzzles @Cyberdefenders
          • Boss of the SOC v2
          • Big-Picture view of current real-world attacks
          • Security Detectors for Wazuh (Mock Mode) @GitHub
      • Blue team for dev
      • Blue team @Home

    SIEM and threat intelligence/hunting notes¶

    Making ‘The Boy Who Cried Wolf’ look like a reliable colleague.

    • SIEM & Threat intelligence/hunting notes
    • Incident prevention
    • Threat intelligence lifecycle
    • Pyramid of pain
    • Cyber kill chain
    • MITRE ATT&CK framework
    • Unified kill chain
    • Diamond model
    • Incident handling (NIST)
    • Standards of communication
    • SIEM stack
    • Threat hunting

    Last update: 2025-05-12 14:39
    Back to top
    Previous Security information and event management (SIEM)
    Next SIEM & Threat intelligence/hunting notes
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7