SIEM & Threat intelligence/hunting notes¶
What’s inside?¶
A curated collection of actionable insights for security analysts, covering:
SIEM techniques: Query templates, log correlation tricks, and alert-tuning tips.
Threat intel integration: How to enrich alerts with IoCs (IPs, domains, hashes).
Hunting methodologies: Proactive search patterns for stealthy threats.
Why keep these notes?¶
Fast reference during investigations: No more Googling “Splunk brute-force query” mid-incident.
Learn from real attacks: Includes mapped TTPs (e.g., “APT29 often uses PowerShell + DNS tunneling”).
Bridge theory/practice: Converts concepts like MITRE ATT&CK into actual detection rules.
Write/Read¶
Last update:
2025-05-12 14:39