logo
Defence blues
SIEM and threat intelligence/hunting notes
  • Red tradecraft
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Blue team @Purpleteaming
    • Blue team @SOC
      • Network traffic analysis (NTA)
      • Digital forensics and incident response (DFIR)
      • Endpoint detection and response (EDR)
      • Security information and event management (SIEM)
        • SIEM and threat intelligence/hunting notes
          • Incident prevention
          • Threat intelligence lifecycle
          • Pyramid of pain
          • Cyber kill chain
          • MITRE ATT&CK framework
          • Unified kill chain
          • Diamond model
          • Incident handling (NIST)
          • Standards of communication
          • SIEM stack
          • Threat hunting
        • SIEM and threat intelligence/hunting notes
          • Incident prevention
          • Threat intelligence lifecycle
          • Pyramid of pain
          • Cyber kill chain
          • MITRE ATT&CK framework
          • Unified kill chain
          • Diamond model
          • Incident handling (NIST)
          • Standards of communication
          • SIEM stack
          • Threat hunting
        • An investigation with Splunk + CKC
        • TryHackMe rooms
        • Puzzles @Cyberdefenders
        • Boss of the SOC v2
        • Big-Picture view of current real-world attacks
        • Security Detectors for Wazuh (Mock Mode) @GitHub
    • Blue team for dev
    • Blue team @Home
    • Bulletproofing servers
    • Golem Trust Computing Ltd.
    • Department of Silent Stability
    • The Home for Bewildered Beasts of Legend
    • Stormforge training grounds
    • Honeytech for humans

    SIEM and threat intelligence/hunting notes¶

    Making ‘The Boy Who Cried Wolf’ look like a reliable colleague.

    • Incident prevention
    • Threat intelligence lifecycle
    • Pyramid of pain
    • Cyber kill chain
    • MITRE ATT&CK framework
    • Unified kill chain
    • Diamond model
    • Incident handling (NIST)
    • Standards of communication
    • SIEM stack
    • Threat hunting
    2026-04-01 20:54
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7