KostasBehind the Scenes: The Daily Grind of Threat HunterI turned a Twitter thread into a blog post on the topic of threat hunting. This is an example of the real-world steps involved during a…7 min read·Nov 29, 2023----
KostasinInfoSec Write-upsUnderstanding Red to Be Better at Blue: Navigating New CrackMapExec UpdatesHow to research and develop detection and hunting techniques based on new features from commonly-used penetration testing frameworks.12 min read·Sep 5, 2023----
KostasThreat Hunting Metrics: The Good, The Bad and The UglyThreat hunting is a crucial aspect of information security, but measuring its effectiveness can be challenging. In this article, we will…6 min read·Aug 21, 2023--1--1
KostasPublic Opinion Survey Results: You’re PwnedI am starting these short-form blog posts that aim to provide insights into attackers’ actions once they gain access to a network. Although…9 min read·Jul 5, 2023----
KostasinDetect FYIEDR Telemetry Project: A Comprehensive ComparisonEndpoint Detection and Response (EDR) products have become essential to organizations’ cybersecurity strategies. As a result, understanding…6 min read·Apr 19, 2023--6--6
KostasinDetect FYIThreat Hunting Series: Detection Engineering VS Threat HuntingThreat hunting is becoming mainstream, and despite the attention it receives, many people need help to differentiate it from other roles…5 min read·Feb 21, 2023--1--1
KostasinInfoSec Write-upsThreat Hunting Series: Using Threat Emulation for Threat HuntingThis post will demonstrate how threat emulation can be used for threat hunting. I often use threat emulation to understand the evidence an…9 min read·Oct 10, 2022--1--1
KostasinInfoSec Write-upsThreat Hunting Series: The Threat Hunting ProcessIn the previous posts of the series, I covered the basics of threat hunting and the core competencies a threat hunter should have9 min read·Jul 18, 2022--1--1
KostasThreat Hunting Series: What Makes a Good Threat HunterContinuing with the second post in this series, I felt it was necessary to address the skills and knowledge required to become a threat…7 min read·Jun 27, 2022----